-
Notifications
You must be signed in to change notification settings - Fork 34
Closed
Description
Hello,
Sparkpost still use old version of Log4j. We are facing problem to fix this alert. Because we cannot upgrade to the new project (https://mvnrepository.com/artifact/org.apache.logging.log4j/log4j-core).
This is the description of the vulnerability :
Included in Log4j 1.2 is a SocketServer class that is vulnerable to deserialization of untrusted data which can be exploited to remotely execute arbitrary code when combined with a deserialization gadget when listening to untrusted network traffic for log data. This affects Log4j versions up to 1.2 up to 1.2.17.
Users are advised to migrate to org.apache.logging.log4j:log4j-core
Source : https://nvd.nist.gov/vuln/detail/CVE-2019-17571
Can you please fix it as soon as possible please?
Regards,
Metadata
Metadata
Assignees
Labels
No labels