Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

\uD83E\uDD14 Problem

A zero-day exploit has been found in the “Apache log4j” Java Component. The exploit allows remote code execution. This security issue is logged as “CVE-2021-44228”. It has the nickname “Log4Shell”.

The exploit uses the Java Naming and Directory Interface (JNDI).

NVD - CVE-2021-44228 (nist.gov)

Is PeopleSync affected?

\uD83C\uDF31 Solution

No. PeopleSync is not affected.

Product

Vulnerable

Reason

PeopleSync Backend

No

The Backend is written in .net. We are not using log4j.

For logging, we are using log4net, which is a port of log4j to the .net framework. Due to the absence of JNDI in .net, it is not possible to exploit Log4Shell in log4net.

PeopleSync Frontend

No

The Frontend is written in PHP. We are not using log4j.

PeopleSync Android App

No

There are no dependencies to log4j.

  • No labels