ppkarwasz commented on code in PR #6: URL: https://github.com/apache/logging-site/pull/6#discussion_r2007074657
########## _vulnerabilities.adoc: ########## @@ -32,8 +32,8 @@ We only extend this mathematical notation with set union operator (i.e., `∪`) |Summary |JDBC appender is vulnerable to remote code execution in certain configurations |CVSS 3.x Score & Vector |6.6 MEDIUM (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H) |Components affected |`log4j-core` -|Versions affected |`[2.0-beta7, 2.3.2) ∪ [2.4, 2.12.4) ∪ [2.13.0, 2.17.1)` -|Versions fixed |`2.3.2` (for Java 6), `2.12.4` (for Java 7), or `2.17.1` (for Java 8 and later) +|Versions affected |`[2.0-beta7, 2.3.1) ∪ [2.4, 2.12.3) ∪ [2.13.0, 2.17.0)` +|Versions fixed |`2.3.1` (for Java 6), `2.12.3` (for Java 7), or `2.17.0` (for Java 8 and later) Review Comment: [LOG4J2-3242 "Limit JNDI to the java protocol only"](https://issues.apache.org/jira/browse/LOG4J2-3242) was implemented one patch version before. Regardless whether the behavior in [CVE-2021-44832](https://www.cve.org/CVERecord?id=CVE-2021-44832) is a vulnerability or not, in versions `2.3.1`, `2.12.3` and `2.17.0` it was not possible to use JNDI schemas other than `java:`. -- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. To unsubscribe, e-mail: notifications-unsubscr...@logging.apache.org For queries about this service, please contact Infrastructure at: us...@infra.apache.org