SpComb edited a comment on pull request #608:
URL: https://github.com/apache/logging-log4j2/pull/608#issuecomment-993560912


   > I'm not quite sure what that means or where we should continue the 
discussion about that, if it s a new attack vector etc.
   
   This should really have been reported privately, or at the minimum via a 
separate GitHub issue, rather than via a public GitHub PR comment.
   
   For anyone else that may come across similar follow-up issues, I suggest you 
follow the instructions on the log4j project website, and use the 
priv...@logging.apache.org email address: 
https://logging.apache.org/log4j/2.x/security.html
   
   > If you have encountered an unlisted security vulnerability or other 
unexpected behaviour that has security impact, or if the descriptions here are 
incomplete, please report them privately to the [Log4j Security 
Team](priv...@logging.apache.org). Thank you.
   
   If this does turn out to be a new attack vector, it probably needs a new CVE 
number. I've attempted to contact the relevant security contacts to take this 
further, I don't know what else to do.
   
   EDIT: https://issues.apache.org/jira/browse/LOG4J2-3221 new Jira ticket for 
tracking this issue, which strictly speaking isn't relevant to the JNDI 
restrictions in this PR. The `log4j2.allowedJndiProtocols/Hosts/Classes` 
defaults implemented in https://github.com/apache/logging-log4j2/pull/608 / 
2.15.0 are good, and the `log4j2.enableJndi=false` default in 
https://github.com/apache/logging-log4j2/commit/44569090f1cf1e92c711fb96dfd18cd7dccc72ea
 / 2.15.1-rc1 / 2.16.0 is even better.


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@logging.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


Reply via email to