<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Log4j on </title>
    <link>https://stoeps.de/tags/log4j/</link>
    <description>Recent content in Log4j on </description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en</language>
    <managingEditor>christoph.stoettner@stoeps.de (Christoph Stoettner)</managingEditor>
    <webMaster>christoph.stoettner@stoeps.de (Christoph Stoettner)</webMaster>
    <copyright>&amp;copy; 2026 Christoph Stöttner - This work is licensed under [CC BY-SA 4.0](https://creativecommons.org/licenses/by-sa/4.0/) &lt;span class=&#39;footerimg&#39;&gt;&lt;img src=&#39;https://mirrors.creativecommons.org/presskit/icons/cc.svg&#39; alt=&#39;&#39; style=&#39;max-width: 1em;max-height:1em;margin-left: .2em;&#39;&gt;&lt;img src=&#39;https://mirrors.creativecommons.org/presskit/icons/by.svg&#39; alt=&#39;&#39; style=&#39;max-width: 1em;max-height:1em;margin-left: .2em;&#39;&gt;&lt;img src=&#39;https://mirrors.creativecommons.org/presskit/icons/sa.svg&#39; alt=&#39;&#39; style=&#39;max-width: 1em;max-height:1em;margin-left: .2em;&#39;&gt;&lt;/span&gt;</copyright>
    <lastBuildDate>Sat, 11 Dec 2021 17:41:38 +0200</lastBuildDate><atom:link href="https://stoeps.de/tags/log4j/index.xml" rel="self" type="application/rss+xml" />
    
    <item>
      <title>Log4j how to find out if an application has it included</title>
      <link>https://stoeps.de/posts/2021/log4j_how_to_find_out/</link>
      <pubDate>Sat, 11 Dec 2021 17:41:38 +0200</pubDate>
      <author>christoph.stoettner@stoeps.de (Christoph Stoettner)</author>
      <guid>https://stoeps.de/posts/2021/log4j_how_to_find_out/</guid>
      <description>&lt;p&gt;&lt;strong&gt;Update &lt;del&gt;2021-12-13&lt;/del&gt; 2021-12-15&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476&#34;  target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;Elasticsearch: Apache Log4j2 Remote Code Execution (RCE) Vulnerability - CVE-2021-44228 - ESA-2021-31&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://support.hcltechsw.com/csm?id=kb_article&amp;amp;sysparm_article=KB0095490&#34;  target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;HCL: CVE-2021-44228 : Security Advisory&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://www.ibm.com/support/pages/node/6525706?myns=swgws&amp;amp;mynp=OCSSEQTP&amp;amp;mync=E&amp;amp;cm_sp=swgws-_-OCSSEQTP-_-E&#34;  target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;IBM: Security Bulletin: Vulnerability in Apache Log4j affects WebSphere Application Server (CVE-2021-44228)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://support.hcltechsw.com/csm?id=kb_article&amp;amp;sysparm_article=KB0095498&#34;  target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;Security Bulletin: HCL Connections Security Update for Apache Log4j 2 Vulnerability (CVE-2021-44228)&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046&#34;  target=&#34;_blank&#34; rel=&#34;noreferrer&#34;&gt;CVE-2021-45046: It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations.&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;p&gt;So there is a fix for &lt;code&gt;kc.war&lt;/code&gt; which updates the &lt;code&gt;log4j&lt;/code&gt; 2.8 to 2.15, Elasticsearch in Component Pack has log4j 2.8 and 2.11 included &lt;del&gt;but is not vulnerable because of additional security settings.&lt;/del&gt;&lt;/p&gt;</description>
      <media:content xmlns:media="http://search.yahoo.com/mrss/" url="https://stoeps.de/posts/2021/log4j_how_to_find_out/feature.jpg" />
    </item>
    
  </channel>
</rss>
