Skip to content

log4j vulnerablity - is Mirth affected? #4892

Answered by narupley
rangercej asked this question in Q&A
Discussion options

You must be logged in to vote

Mirth Connect still uses log4j 1.2.16, and doesn't include log4j 2.x. I tested logging out the exploit string described in the vulnerability, with a network capture going at the same time, and confirmed that the JNDI connection is not being made. I did that testing in older versions of Java like 8u60 as well.

In fact, that JndiLookup class isn't even present at all in the log4j 1.x JAR. That looks to have been added in 2.x: https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup

So as far as I can tell, MC is not affected by this CVE, unless you are explicitly including log4j 2.x as a custom library. And even if you are, you still won't be vulnerable as long as you're using on…

Replies: 13 comments 87 replies

Comment options

You must be logged in to vote
1 reply
@jhowe-uw
Comment options

Comment options

You must be logged in to vote
1 reply
@eric-hf
Comment options

Comment options

You must be logged in to vote
4 replies
@eric-hf
Comment options

@rangercej
Comment options

@narupley
Comment options

@narupley
Comment options

Comment options

You must be logged in to vote
16 replies
@jtc42
Comment options

@rangercej
Comment options

@vincentvent
Comment options

@ChristopherSchultz
Comment options

@vincentvent
Comment options

Answer selected by pacmano1
Comment options

You must be logged in to vote
1 reply
@jtc42
Comment options

Comment options

You must be logged in to vote
6 replies
@psapozh
Comment options

@pcdewolff
Comment options

@ChristopherSchultz
Comment options

@edmundgr
Comment options

@tonygermano
Comment options

Comment options

You must be logged in to vote
2 replies
@evulhotdog
Comment options

@robertojnior
Comment options

Comment options

You must be logged in to vote
30 replies
@tonygermano
Comment options

@tonygermano
Comment options

@twest-mirthconnect
Comment options

@ChristopherSchultz
Comment options

@twest-mirthconnect
Comment options

Comment options

You must be logged in to vote
11 replies
@jonbartels
Comment options

@tonygermano
Comment options

@ChristopherSchultz
Comment options

@tonygermano
Comment options

@ChristopherSchultz
Comment options

This comment was marked as disruptive content.

Comment options

You must be logged in to vote
10 replies
@JoeFox82
Comment options

@jonbartels
Comment options

@ChristopherSchultz
Comment options

@s2ramana
Comment options

@twest-mirthconnect
Comment options

Comment options

You must be logged in to vote
5 replies
@JCW-1087
Comment options

@twest-mirthconnect
Comment options

@JCW-1087
Comment options

@johnpfaff
Comment options

@JoeFox82
Comment options

Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment