bitvoodoo Advisories
Space shortcuts
Space Tools
bitvoodoo Advisories BVADVIS

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 17 Next »


Date

 

Product

bitvoodoo apps

VulnerabilityNot applicable
Official linkMultiple Products Security Advisory - Log4j Vulnerable To Remote Code Execution - CVE-2021-44228

Dear customer,

On Thursday 9th December, developers and security researchers found a security vulnerability in Apache Log4j 2.

What you need to know

A security vulnerability was discovered in Apache Log4j 2. Log4j is a popular logging package for Java.

This is a security issue affecting a broad range of software based upon Java. Atlassian products such as Jira and Confluence run on Java and also utilize Log4j.

Atlassian products

On 13th December, Atlassian put out a Security Advisory for this exploit under Multiple Products Security Advisory - Log4j Vulnerable To Remote Code Execution - CVE-2021-44228

bitvoodoo apps

Server and Data Center

AppStatusExplanation
Viewtracker - Analytics for Confluence

NOT VULNERABLE

We do not use lookup and Confluence uses an old version of Log4j not affected.










Navitabs - Tabs for Confluence

NOT VULNERABLE

Advanced Panelboxes for Confluence

NOT VULNERABLE

Translations for Confluence

NOT VULNERABLE

Chat for Confluence

NOT VULNERABLE

Enterprise Theme for Confluence

NOT VULNERABLE

Templates for Blog Posts for Confluence

NOT VULNERABLE

Redirect for Confluence

NOT VULNERABLE

Content Scheduler for Confluence

NOT VULNERABLE

Advanced Search for Confluence

NOT VULNERABLE

Attachment Tracking for Confluence

NOT VULNERABLE

Search Analytics for Confluence

NOT VULNERABLE

Custom Field Option Synchroniser

NOT VULNERABLE

Even though we use lookup of jndi for datasources, we use a static predefined prefix that contains "java:". This prevents other protocols from being used.
Congrats for Confluence

NOT VULNERABLE

We do not use lookup and Confluence uses an old version of Log4j not affected.
Label Scheduler for Confluence

NOT VULNERABLE

Macro Documentation for Confluence

NOT VULNERABLE

SBB Widgets for Confluence

NOT VULNERABLE

Viewtracker Supplier

NOT VULNERABLE

Label Fixer

NOT VULNERABLE

Cloud

AppStatusExplanation

Viewtracker - Analytics for Confluence

NOT VULNERABLE

Our Cloud apps are not affected. We do not use Log4j in our Cloud Apps. We work with the default logging of Spring Boot instead. See Log4J2 Vulnerability and Spring Boot

Navitabs - Tabs for Confluence

NOT VULNERABLE

Advanced Panelboxes for Confluence

NOT VULNERABLE

Translations for Confluence

NOT VULNERABLE

What should I do?

If you are using the default configuration of Log4j, you are not affected, and no action is needed. However, if you have ever customized the configuration of Log4j to work with JMS Appenders, please disable them by following the mitigation described by Atlassian.

As we cannot speak for other app vendors, we cannot be sure that other apps are safe. You might need to get in touch with other Atlassian Marketplace vendors.


Further Reading


  • No labels
bitvoodoo Advisories BVADVIS