728x90
반응형

Apache Log4j 1.2.x 버전 취약점 해결 방법

 

 


While not affected by the exact same log4shell issue, the apache log4j team recommends to remove JMSAppender and SocketServer, which has a vulnerability in CVE-2019-17571, from your jar files.

You can use the zip command to remove the affected classes, replace the filename/version with yours:

zip -d log4j-1.2.16.jar org/apache/log4j/net/JMSAppender.class
zip -d log4j-1.2.16.jar org/apache/log4j/net/SocketServer.class

You can look through through the files in your zip using less and grep,
e.g. less log4j-1.2.16.jar | grep JMSAppender

That being said, Apache recommends that you upgrade to the 2.x version if possible. According to their security page:

Please note that Log4j 1.x has reached end of life and is no longer supported. Vulnerabilities reported after August 2015 against Log4j 1.x were not checked and will not be fixed. Users should upgrade to Log4j 2 to obtain security fixes.

answered yesterday
giraffesyo
3,7931 gold badge22 silver badges

 


https://stackoverflow.com/questions/70310980/log4j-vulnerability-is-log4j1-2-17-vulnerable-was-unable-to-find-any-jndi-cod

 

log4j-vulnerability - Is log4j1.2.17 vulnerable (was unable to find any jndi code in source)?

With regard to the log4j jndi remote code execution vulnerability that has been identified CVE-2021-44228 - (also see references) - wondered if Log4j-v1.2 is also impacted but the closest I got from

stackoverflow.com

 

#log4j-vulnerability 

728x90
SMALL

'WorkHolic' 카테고리의 다른 글

Log4shell 첫 발생 외  (0) 2021.12.16
Apache Log4j 1.2.x 버전 취약점 해결 방법 #2  (0) 2021.12.16
SELinux 설정  (0) 2021.12.10
MySQL Proxy  (0) 2021.11.10
403 4.7.0 TLS handshake failed (Sendmail) 해결하기  (0) 2021.10.13
Posted by gromet

블로그 이미지
나는 운이 좋은 사람이다 나는 나날이 점점 더 좋아진다 내가 하는 선택과 행동은 반드시 성공으로 이어진다 내게는 인내력과 지속력이 있다 네게는 좋은것들만 모여든다
gromet

공지사항

Yesterday
Today
Total
반응형

달력

 « |  » 2024.6
1
2 3 4 5 6 7 8
9 10 11 12 13 14 15
16 17 18 19 20 21 22
23 24 25 26 27 28 29
30

최근에 올라온 글

최근에 달린 댓글

최근에 받은 트랙백

글 보관함

160x600