A high severity vulnerability (CVE-2021-44228, CVSSv3 10.0) impacting multiple versions of the Apache Log4j 2 utility was disclosed publicly via the project’s GitHub on December 9, 2021. This vulnerability, discovered by Chen Zhaojun of Alibaba Cloud Security Team, impacts Apache Log4j 2 versions 2.0 to 2.14.1. According to the developer, version 1.x of Log4j is not susceptible to this vulnerability. The vulnerability allows for unauthenticated remote code execution.

As per Apache Log4j, all log4j-core versions >=2.0-beta9 and <=2.14.1 are affected.

Here’s what you need to know:

  • FlexDeploy is not susceptible to this vulnerability. The FlexDeploy application (Tomcat and WebLogic) and its plugins do not include any log4j-core jar files.
  • The FlexDeploy Tomcat distribution does not include log4j-core jar files.
  • A few customers use Oracle WebLogic as the application server for FlexDeploy. Oracle Support has indicated that the Oracle WebLogic Server does not require patching for this vulnerability.
  • While not required for FlexDeploy, it appears that the upgrade of Java to 8u191 or higher helps mitigate this situation.
  • Customers are advised to look into any custom developed plugins, scripts and other products that are used in conjunction with FlexDeploy for this vulnerability.

This has been documented on our support FAQ as well.

Other useful resources:

Share this:
Chandresh Patel

I have been working with Java EE technologies since 2000. After implementing IBM WebSphere and custom framework solutions, my past 10 years have been focused on Oracle Fusion Middleware such as WebLogic, ADF, WebCenter and Coherence. I have been part of many automation projects in the past and have a passion for automation capabilities to help our customers deliver software faster and with higher quality. In my current role as a Principal Architect at Flexagon, I am driving the FlexDeploy product strategy and development to build DevOps/CI/CD features that help our customers.

More posts by Chandresh Patel
    

Leave a Reply

Your email address will not be published. Required fields are marked *