Indupa commented on pull request #7898:
URL: https://github.com/apache/kafka/pull/7898#issuecomment-1047472293


   Hi @dongjinleekr , Can you please provide me Some information on the 
Vulenerabiities regarding log4j features , Is this following vulnerable 
features of log4j are using in Kafka 2.8.1 for any of the kafka related 
things...................?
   
   CVE-2019-17571 is a high severity issue targeting the
   SocketServer. Log4j includes a SocketServer that accepts serialized
   log events and deserializes them without verifying whether the
   objects are allowed or not. This can provide an attack vector that
   can be expoited.
   => **is log4j's socketServer used in kafka.......?**
   
   CVE-2020-9488 is a moderate severity issue with the
   SMTPAppender. Improper validation of certificate with host mismatch
   in Apache Log4j SMTP appender. This could allow an SMTPS connection
   to be intercepted by a man-in-the-middle attack which could leak any
   log messages sent through that appender.
   **=> is log4j's SMTPAppender is used in kafka..........?**
   
   CVE-2022-23302 is a high severity deserialization vulnerability in
   JMSSink. JMSSink uses JNDI in an unprotected manner allowing any
   application using the JMSSink to be vulnerable if it is configured
   to reference an untrusted site or if the site referenced can be
   accesseed by the attacker. For example, the attacker can cause
   remote code execution by manipulating the data in the LDAP store.
   **=> Is is log4j's JMSSink is used in kafka..............?**
   
   
   CVE-2022-23305 is a high serverity SQL injection flaw in
   JDBCAppender that allows the data being logged to modify the
   behavior of the component. By design, the JDBCAppender in Log4j
   1.2.x accepts an SQL statement as a configuration parameter where
   the values to be inserted are converters from PatternLayout. The
   message converter, %m, is likely to always be included. This allows
   attackers to manipulate the SQL by entering crafted strings into
   input fields or headers of an application that are logged allowing
   unintended SQL queries to be executed.
   **=> Is is log4j's JDBCAppender is used in kafka.....................?**
   
   Can you please help me and provide me the info on this....................?
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: jira-unsubscr...@kafka.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


Reply via email to