-
|
News is breaking that there's a remote code execution vulnerability in log4j. I'm not sure what version of log4j ships with Mirth, but there are mitigations. Questions are:
More details: https://www.lunasec.io/docs/blog/log4j-zero-day/ |
Beta Was this translation helpful? Give feedback.
Replies: 13 comments 87 replies
-
|
Came here searching for same thing - just looking at my install of 3.9.1 i find 8 instances of log4j-1.2.16.jar (and no other versions) - but I have no idea how to get Mirth to use a newer one. |
Beta Was this translation helpful? Give feedback.
-
|
Any updates on this? |
Beta Was this translation helpful? Give feedback.
-
|
I am seeing people say that the 1.xx versions of log4j are not vulnerable, only the 2.x ones < 2.15. Not 100% sure if this is accurate |
Beta Was this translation helpful? Give feedback.
{{title}}
{{editor}}'s edit
{{editor}}'s edit
-
|
Mirth Connect still uses log4j 1.2.16, and doesn't include log4j 2.x. I tested logging out the exploit string described in the vulnerability, with a network capture going at the same time, and confirmed that the JNDI connection is not being made. I did that testing in older versions of Java like 8u60 as well. In fact, that JndiLookup class isn't even present at all in the log4j 1.x JAR. That looks to have been added in 2.x: https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup So as far as I can tell, MC is not affected by this CVE, unless you are explicitly including log4j 2.x as a custom library. And even if you are, you still won't be vulnerable as long as you're using one of these Java versions or newer:
As a side note we also have an item on our roadmap to upgrade log4j from 1.x to 2.x! It was just dumb luck I guess that we had not gotten around to doing that yet. |
Beta Was this translation helpful? Give feedback.
-
|
As a heads-up for folk as well, if you have pulled log4j v2 in as an external, Java versions later than (say) 8u191 may be affected through different JNDI vectors. I admit I don't know enough Java to know how realistic this is though, but have been signposted to https://www.veracode.com/blog/research/exploiting-jndi-injections-java |
Beta Was this translation helpful? Give feedback.
-
|
The problem with log4j version 1 is also that it had its end of life on August 5, 2015. So nobody knows what other security vulnerabilities are there, and nobody looks for them either. As mirth is a communication server which handles clinical data I think updating log4j is rather critical (not saying that the other updates are not important too). I did a scan of nextgenhealthcare/connect:3.12 with trivy that shows 10 critical vulnerabilities. I don't know though which of these would really be applicable. |
Beta Was this translation helpful? Give feedback.
{{title}}
{{editor}}'s edit
{{editor}}'s edit
-
|
As of yesterday there is a new vulnerability which affects log4j Version 1.2 |
Beta Was this translation helpful? Give feedback.
-
|
Is there any official works from Mirth about this or a fix.. We are getting hammered by our customers about this issue... |
Beta Was this translation helpful? Give feedback.
-
|
Considering the vulnerabilities that the version of Log4J that Mirth Connect uses has, please upgrade to a newer version so we can recommend upgrading to a version of Mirth that will address these concerns. |
Beta Was this translation helpful? Give feedback.
This comment was marked as disruptive content.
This comment was marked as disruptive content.
-
|
@JoeFox82 proposal
sounds quite good and probably doable quite fast. If I'm not wrong we would only have to delete the log4j jars here: and replace them with Currently trying some compiling (unsuccessful so far) |
Beta Was this translation helpful? Give feedback.
-
|
the log4j update is currently in development. We will have it ready for release with 4.1 the end of July. |
Beta Was this translation helpful? Give feedback.
-
|
Today
From: John Pfaff ***@***.***>
Sent: Friday, July 29, 2022 10:06 AM
To: nextgenhealthcare/connect ***@***.***>
Cc: Travis West ***@***.***>; Mention ***@***.***>
Subject: Re: [nextgenhealthcare/connect] log4j vulnerablity - is Mirth affected? (Discussion #4892)
[EXTERNAL]
Is the 4.1 release still coming soon?
—
Reply to this email directly, view it on GitHub<#4892 (reply in thread)>, or unsubscribe<https://github.com/notifications/unsubscribe-auth/AU5HHFWGQZEZMW6NUEO2NZ3VWPXL5ANCNFSM5JYTI37A>.
You are receiving this because you were mentioned.Message ID: ***@***.******@***.***>>
|
Beta Was this translation helpful? Give feedback.


Mirth Connect still uses log4j 1.2.16, and doesn't include log4j 2.x. I tested logging out the exploit string described in the vulnerability, with a network capture going at the same time, and confirmed that the JNDI connection is not being made. I did that testing in older versions of Java like 8u60 as well.
In fact, that JndiLookup class isn't even present at all in the log4j 1.x JAR. That looks to have been added in 2.x: https://logging.apache.org/log4j/2.x/manual/lookups.html#JndiLookup
So as far as I can tell, MC is not affected by this CVE, unless you are explicitly including log4j 2.x as a custom library. And even if you are, you still won't be vulnerable as long as you're using on…