I'll second that.  Thank you!

Brian

Quoting Luke Chen <show...@gmail.com>:

Hi Jun,

It looks great and clear!
Thank you for working on the public statement!

Thank you.
Luke

On Wed, Dec 15, 2021 at 8:34 AM Jun Rao <j...@confluent.io.invalid> wrote:

Hi, Everyone,

Just to provide an update. https://kafka.apache.org/cve-list is now
updated
with this CVE.

Thanks,

Jun

On Tue, Dec 14, 2021 at 3:30 PM Jun Rao <j...@confluent.io> wrote:

Hi, Israel,

Randall added some clarification for the connectors in the PR.

Thanks,

Jun

On Tue, Dec 14, 2021 at 12:10 PM Israel Ekpo <israele...@gmail.com>
wrote:

Do we want to add a disclaimer that users need to check their connectors
to
see if it uses log4j2?

Though the core library does not use this dependency, it is possible
external connectors that use it could introduce vulnerabilities if they
depend on the affected log4j2 version

On Tue, Dec 14, 2021 at 1:40 PM Israel Ekpo <israele...@gmail.com>
wrote:

Sure I will take a look at it shortly

On Tue, Dec 14, 2021 at 12:44 PM Jun Rao <j...@confluent.io.invalid>
wrote:

Hi, Luke,

Thanks for the analysis. We are trying to put a public statement on
this
through this PR: https://github.com/apache/kafka-site/pull/388. If
anyone
has more feedback, we can iterate on the PR.

Thanks,

Jun


On Tue, Dec 14, 2021 at 7:53 AM Murilo Tavares <murilo...@gmail.com>
wrote:

> What about Kafka-Connect?
> Anyone has checked if any of the Confluent KafkaConnect docker
images
embed
> log4j v2?
> Thanks
>
> On Mon, 13 Dec 2021 at 21:39, Luke Chen <show...@gmail.com> wrote:
>
> > Hi all,
> >
> > Here's the comments for CVE-2021-44228 vulnerability *from SLF4J
> project*.
> > REF: http://slf4j.org/log4shell.html
> >
> > I think it's a analysis that worth reading. Most importantly, it
has
> > comments about log4j 1.x versions, which is currently Kafka used.
> > I quote some sentences here for your reference:
> >
> > 1. As *log4j 1.x *does NOT offer a JNDI look up mechanism at the
message
> > level,* it does NOT suffer from CVE-2021-44228.*
> > 2. However, log4j 1.x comes with JMSAppender which will perform a
JNDI
> > lookup if enabled in log4j's configuration file, i.e.
*log4j.properties*
> or
> > *log4j.xml*.
> > 3. In the absence of a new log4j 1.x release, you can remove
JMSAppender
> > from the *log4j-1.2.17.jar* artifact yourself. (commands are
listed in
> the
> > page <http://slf4j.org/log4shell.html>)
> > 4. Therefore, in addition to hardening KNOWN vulnerable
components
in
> > aforementioned frameworks, we also recommend that *configuration
files be
> > protected against write access*. In Unix-speak they should be
*read-only
> > for all users, including the owner*. If possible, they should
also
be
> > monitored against changes and unauthorized manipulation.
> >
> > Thank you.
> > Luke
> >
> > On Tue, Dec 14, 2021 at 12:55 AM David Ballano Fernandez <
> > dfernan...@demonware.net> wrote:
> >
> > > Thanks guys!
> > >
> > > On Mon, Dec 13, 2021 at 7:43 AM Brian Rickabaugh <
br...@rickabaugh.net
> >
> > > wrote:
> > >
> > > >   I strongly recommend that the Kafka community publish a
statement
> on
> > > this
> > > > vulnerability.
> > > >
> > > > This Log4J exploit is getting a lot of publicity in my
organization
> > and a
> > > > page to point our security team to would be very helpful.
> > > >
> > > > Brian
> > > >
> > > > Quoting Luke Chen <show...@gmail.com>:
> > > >
> > > > > Due to this vulnerability is quite critical and "popular"
in
these
> > > days,
> > > > > should *Kafka have an official announcement in our security
cve
> list
> > > page
> > > > > or somewhere*? (i.e.
> > > >
> > >
> >
>



https://urldefense.proofpoint.com/v2/url?u=https-3A__kafka.apache.org_cve-2Dlist&d=DwIFaQ&c=qE8EibqjfXM-zBfebVhd4gtjNZbrDcrKYXvb1gt38s4&r=p-f3AJg4e4Uk20g_16kSyBtabT4JOB-1GIb23_CxD58&m=bgQoydMIn6_TMXjRt2Jw8AUS-IPeFX07xSqA4ONmNUDFJXnB5xNHw7TFiy6UD4gP&s=lGTK9XqyO0i5KkSD6aOpmRxCVx90zrXNRtOq0vtSPSc&e=
> > > > )
> > > > >
> > > > > So far, my assessment is that, Kafka is not using log4j 2.x
> versions,
> > > so
> > > > > the risk is lower.
> > > > > Kafka is using log4j 1.x version. As long as users don't
set
the
> jms
> > > > > appender, with the *TopicBindingName* or
> > > > > *TopicConnectionFactoryBindingName
> > > > > *configured with the JNDI can handle (ex:
"ldap://host:port/a";), it
> > is
> > > > > safe. (usually we don't set the topic name or factory name
to
this
> > kind
> > > > of
> > > > > for name)
> > > > >
> > > > > One thing to add is that, we are currently working on
upgrading
> > log4j 1
> > > > to
> > > > > log4j 2 (KAFKA-9366 <
> > > >
> > >
> >
>



https://urldefense.proofpoint.com/v2/url?u=https-3A__issues.apache.org_jira_browse_KAFKA-2D9366&d=DwIFaQ&c=qE8EibqjfXM-zBfebVhd4gtjNZbrDcrKYXvb1gt38s4&r=p-f3AJg4e4Uk20g_16kSyBtabT4JOB-1GIb23_CxD58&m=bgQoydMIn6_TMXjRt2Jw8AUS-IPeFX07xSqA4ONmNUDFJXnB5xNHw7TFiy6UD4gP&s=wNhgW9w7vSqIYgBLQ1iOcfBsQg3vHcPHxChyXqQ2-K0&e=
> > > > >),
> > > > > and we'll make sure it upgrades to 2.15.0 or newer
versions.
> > > > >
> > > > > Thank you.
> > > > > Luke
> > > > >
> > > > > On Sun, Dec 12, 2021 at 12:00 PM Luke Chen <
show...@gmail.com>
> > wrote:
> > > > >
> > > > >> Hi David Ballano Fernandez and all,
> > > > >>
> > > > >> Some update here:
> > > > >> Based on @TopStreamsNet's comment here:
> > > > >>
> > > >
> > >
> >
>



https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_apache_logging-2Dlog4j2_pull_608-23issuecomment-2D991723301&d=DwIFaQ&c=qE8EibqjfXM-zBfebVhd4gtjNZbrDcrKYXvb1gt38s4&r=p-f3AJg4e4Uk20g_16kSyBtabT4JOB-1GIb23_CxD58&m=bgQoydMIn6_TMXjRt2Jw8AUS-IPeFX07xSqA4ONmNUDFJXnB5xNHw7TFiy6UD4gP&s=z2x4txhlSwAoPNTeuYxZH8IVCHoGkhLsfbhWDH-SVG4&e=
> > > > >> log4j 1.x versions can still be vulnerable to this issue,
but
only
> > > when
> > > > >> the jms configuration: *TopicBindingName* or
> > > > >> *TopicConnectionFactoryBindingName* is set to something
that
JNDI
> > can
> > > > >> handle - for example "ldap://host:port/a";. In this way,
JNDI
will
> do
> > > > >> exactly the same thing it does for 2.x.
> > > > >> That is, *1.x is vulnerable, just attack vector is "safer"
as
it
> > > depends
> > > > >> on configuration rather than user input.*
> > > > >>
> > > > >> So, in short, as long as you're using Kafka, and not
setting
the
> jms
> > > > >> configuration: *TopicBindingName* or
> > > *TopicConnectionFactoryBindingName
> > > > >> *to
> > > > >> something that JNDI can handle, it is safe!
> > > > >>
> > > > >> Thank you.
> > > > >> Luke
> > > > >>
> > > > >> On Sat, Dec 11, 2021 at 4:23 PM Luke Chen <
show...@gmail.com>
> > wrote:
> > > > >>
> > > > >>> Hi David Ballano Fernandez,
> > > > >>>
> > > > >>> Thanks for reporting this issue. Yes, this is the most
critical
> > 0-day
> > > > >>> vulnerability for security members.
> > > > >>> I've been investigating this CVE for a while, and I
confirmed
> that*
> > > > >>> log4j 1.x versions are not affected by this
vulnerability.*
> > > > >>> That is, *Kafka, which is using log4j 1.x, is not
affected
by
> this
> > > > >>> vulnerability*.
> > > > >>> So, users can safely use Kafka without worries! :)
> > > > >>>
> > > > >>> REF: Here, the PMC of log4j 2 comment on the PR to fix
the
> > > > vulnerability
> > > > >>> here
> > > > >>>
> > > > <
> > > >
> > >
> >
>



https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_apache_logging-2Dlog4j2_pull_608-23issuecomment-2D990494126&d=DwIFaQ&c=qE8EibqjfXM-zBfebVhd4gtjNZbrDcrKYXvb1gt38s4&r=p-f3AJg4e4Uk20g_16kSyBtabT4JOB-1GIb23_CxD58&m=bgQoydMIn6_TMXjRt2Jw8AUS-IPeFX07xSqA4ONmNUDFJXnB5xNHw7TFiy6UD4gP&s=6RYStOYjw2vQZteGALeXGun6DVhCKcs539cR9tr3m8A&e=
> > > > >
> > > > >>> and said:
> > > > >>>
> > > > >>> *Update (2021-12-11 09:09 JST): according to this
analysis
> > > > >>> <
> > > >
> > >
> >
>



https://urldefense.proofpoint.com/v2/url?u=https-3A__twitter.com_ceki_status_1469449618316533762&d=DwIFaQ&c=qE8EibqjfXM-zBfebVhd4gtjNZbrDcrKYXvb1gt38s4&r=p-f3AJg4e4Uk20g_16kSyBtabT4JOB-1GIb23_CxD58&m=bgQoydMIn6_TMXjRt2Jw8AUS-IPeFX07xSqA4ONmNUDFJXnB5xNHw7TFiy6UD4gP&s=ZhLYIdqAKXaVPEbVpd3uce5dtisDqwoWaji_UMVM5Es&e=
> > > > > by @ceki
> > > > >>> <
> > > >
> > >
> >
>



https://urldefense.proofpoint.com/v2/url?u=https-3A__github.com_ceki&d=DwIFaQ&c=qE8EibqjfXM-zBfebVhd4gtjNZbrDcrKYXvb1gt38s4&r=p-f3AJg4e4Uk20g_16kSyBtabT4JOB-1GIb23_CxD58&m=bgQoydMIn6_TMXjRt2Jw8AUS-IPeFX07xSqA4ONmNUDFJXnB5xNHw7TFiy6UD4gP&s=103KstS4K4BNNdpX7RDbGisXiPzc62Eq5yiO6DJgn8k&e=
> > > > > (the author of log4j 1.x), Log4j 1.x is not
> > > > >>> impacted, since it does not have lookups, and the JMS
Appender
> only
> > > > >>> loads
> > > > >>> Strings from the remote server, not serialized objects.*
> > > > >>>
> > > > >>> That is, log4j 1 is actually another project from log4j
2,
and
> the
> > > > >>> author
> > > > >>> of the log4j 1 confirmed log4j 1 is not impacted by this
> > > vulnerability!
> > > > >>>
> > > > >>> Thank you
> > > > >>> *.*
> > > > >>> Luke
> > > > >>>
> > > > >>> On Sat, Dec 11, 2021 at 6:42 AM David Ballano Fernandez <
> > > > >>> dfernan...@demonware.net> wrote:
> > > > >>>
> > > > >>>> Hi All,
> > > > >>>>
> > > > >>>> I wonder if you guys have heard about this vulnerability
> > > > >>>>
> > > >
> > >
> >
>



https://urldefense.proofpoint.com/v2/url?u=https-3A__www.randori.com_blog_cve-2D2021-2D44228_&d=DwIFaQ&c=qE8EibqjfXM-zBfebVhd4gtjNZbrDcrKYXvb1gt38s4&r=p-f3AJg4e4Uk20g_16kSyBtabT4JOB-1GIb23_CxD58&m=bgQoydMIn6_TMXjRt2Jw8AUS-IPeFX07xSqA4ONmNUDFJXnB5xNHw7TFiy6UD4gP&s=TaOz7ebOBrjIW_i2K4MduRFI7vsBBUZMKr9B1K6JupI&e=
> > > >   affecting log4j v1 and
> > > > v2
> > > > >>>> as far as i can see kafka 2.7 and 2.8 are using log4j
v1.
which
> is
> > > > only
> > > > >>>> affected if using jms appender.
> > > > >>>>
> > > > >>>> any thoughts?
> > > > >>>>
> > > > >>>> Thanks!
> > > > >
> > > > >
> > > >
> > >
> >
>

--
Israel Ekpo
Lead Instructor, IzzyAcademy.com
https://izzyacademy.com/

 

 

Reply via email to