[ 
https://issues.apache.org/jira/browse/LOG4J2-3208?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17459857#comment-17459857
 ] 

Remko Popma commented on LOG4J2-3208:
-------------------------------------

[~dcieslak] No, unfortunately this mitigation (setting environment variable 
{{LOG4J_FORMAT_MSG_NO_LOOKUPS=true}} is NOT a recommended measure any more. We 
found that it is possible for attackers to circumvent this.

The security page (https://logging.apache.org/log4j/2.x/security.html) has been 
updated to reflect this.

The *only* valid mitigation is upgrading to Log4j 2.16.0+ or removing the 
JndiLookup class from the log4j-core JAR.

> Disable JNDI by default
> -----------------------
>
>                 Key: LOG4J2-3208
>                 URL: https://issues.apache.org/jira/browse/LOG4J2-3208
>             Project: Log4j 2
>          Issue Type: Story
>          Components: Core
>    Affects Versions: 2.15.0
>            Reporter: Ralph Goers
>            Priority: Major
>             Fix For: 2.16.0
>
>
> Dealing with CVE-2021-44228 has shown the JNDI has significant security 
> issues. While we have mitigated what we are aware of it would be safer for 
> users to completely disable it by default, especially since the large 
> majority are unlikely to be using it. Those who are will need to specify 
> -Dlog4j2.enableJndi=true or the environment variable form of it to use any 
> JNDI components.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to