On December 10, 2021, a bug in Log4J, a ubiquitous logging mechanism present in many Java applications mas made public. You can find detailed information about CVE-2021-44228 by clicking here. This is a quick update to inform you how we addressed the issues in our backend applications, which are in great part built with Java Enterprise.
- We have upgraded the Spring Boot applications to use the latest update of Log4J: org.apache.logging.log4j:log4j-bom:2.15.0
- We configured the Spring Boot applications to ignore the JNDI requests: spring: jndi: ignore: true
- Every VM is now running with the JVM Option - Dlog4j2.formatMsgNoLookups=true to mitigate any potential information disclosure.
- Our backend services are not open, and they operate behind a firewall/load balancer configuration. We have investigated our logs and security systems to check for JNDI/LDAP requests and could not find any, leading us to believe that our systems have not been scanned for these vulnerabilities.
You can find more information about the Log4J vulnerability described in CVE-2021-44228 on these links:
- https://www.crowdstrike.com/blog/log4j2-vulnerability-analysis-and-mitigation-recommendations/
- https://spring.io/blog/2021/12/10/log4j2-vulnerability-and-spring-boot
- https://blog.cloudflare.com/actual-cve-2021-44228-payloads-captured-in-the-wild/
- https://github.com/YfryTchsGD/Log4jAttackSurface
Unlock the power of glocalization with our Translation Management System.
Unlock the power of
with our Translation Management System.
Translate twice as fast impeccably
Get StartedOur online Events!
Join our communityThe first 14 days are on us
World-class Support