Drools Log4j Security Vulnerability

39 views
Skip to first unread message

Techie

unread,
Dec 12, 2021, 11:39:14 AM12/12/21
to Drools Development
Hi All,

Does anyone know if Drools uses Log4j internally which has the Day-Zero security vulnerability

Thanks

Matteo Mortari

unread,
Dec 12, 2021, 12:37:09 PM12/12/21
to drools-de...@googlegroups.com
Hi,
Drools (https://github.com/kiegroup/drools) internally have been using SLF4J (http://www.slf4j.org) for a long time, so to answer your question, no.

Only some examples might have been using Log4j as a logging backend, but still from SLF4J; so unless you import and use the Log4j API in *your* application code that again is not impacting.

Please avoid cross-posting, I've seen this message both on drools-usage and drools-development mailing-list. Ref: https://drools.org/community/getHelp.html

Hope this helps,
MM

--
You received this message because you are subscribed to the Google Groups "Drools Development" group.
To unsubscribe from this group and stop receiving emails from it, send an email to drools-developm...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/drools-development/efbfdc9a-6d07-4d33-be3a-472f216063a9n%40googlegroups.com.


--

shre...@gmail.com

unread,
Dec 13, 2021, 10:27:12 AM12/13/21
to Drools Development
Hello Matteo,

I have scanned the drools repo for kie-wb distributions with the utility here: https://github.com/logpresso/CVE-2021-44228-Scanner
The results say that there are vulnerabilities as below:

java -jar logpresso-log4j2-scan-1.2.2.jar /Users/shreyash/drools/

[*] Found CVE-2021-44228 vulnerability in /Users/shreyash/drools/kie-wb-distributions/business-central-parent/add-ons-distribution/target/migration-tool/kie-wb-common-cli-migration-tool-7.35.0-SNAPSHOT/lib/log4j-core-2.11.1.jar, log4j 2.11.1

[*] Found CVE-2021-44228 vulnerability in /Users/shreyash/drools/kie-wb-distributions/business-central-parent/business-central-webapp/target/business-central-webapp/WEB-INF/lib/log4j-core-2.11.1.jar, log4j 2.11.1

[*] Found CVE-2021-44228 vulnerability in /Users/shreyash/drools/kie-wb-distributions/business-central-parent/business-central-webapp/target/business-central-webapp-thorntail.jar (m2repo/org/apache/logging/log4j/log4j-core/2.11.1/log4j-core-2.11.1.jar), log4j 2.11.1

[*] Found CVE-2021-44228 vulnerability in /Users/shreyash/drools/kie-wb-distributions/business-central-parent/business-central-webapp/target/business-central-webapp.war (WEB-INF/lib/log4j-core-2.11.1.jar), log4j 2.11.1

[*] Found CVE-2021-44228 vulnerability in /Users/shreyash/drools/kie-wb-distributions/business-central-parent/business-central-distribution-wars/business-central/target/business-central-7.35.0-SNAPSHOT-wildfly14/WEB-INF/lib/log4j-core-2.11.1.jar, log4j 2.11.1

[*] Found CVE-2021-44228 vulnerability in /Users/shreyash/drools/kie-wb-distributions/business-central-parent/business-central-distribution-wars/business-central/target/business-central-7.35.0-SNAPSHOT-wildfly14.war (WEB-INF/lib/log4j-core-2.11.1.jar), log4j 2.11.1

[*] Found CVE-2021-44228 vulnerability in /Users/shreyash/drools/kie-wb-distributions/business-central-parent/business-central-distribution-wars/business-central/target/business-central-7.35.0-SNAPSHOT-wildfly-deployable/wildfly-14.0.1.Final/standalone/deployments/business-central.war/WEB-INF/lib/log4j-core-2.11.1.jar, log4j 2.11.1

[*] Found CVE-2021-44228 vulnerability in /Users/shreyash/drools/kie-wb-distributions/business-central-parent/business-central-distribution-wars/business-monitoring/target/business-monitoring-7.35.0-SNAPSHOT-wildfly14/WEB-INF/lib/log4j-core-2.11.1.jar, log4j 2.11.1

[*] Found CVE-2021-44228 vulnerability in /Users/shreyash/drools/kie-wb-distributions/business-central-parent/business-central-distribution-wars/business-monitoring/target/business-monitoring-7.35.0-SNAPSHOT-wildfly-deployable/wildfly-14.0.1.Final/standalone/deployments/business-central.war/WEB-INF/lib/log4j-core-2.11.1.jar, log4j 2.11.1

[*] Found CVE-2021-44228 vulnerability in /Users/shreyash/drools/kie-wb-distributions/business-central-parent/business-central-distribution-wars/business-monitoring/target/business-monitoring-7.35.0-SNAPSHOT-wildfly14.war (WEB-INF/lib/log4j-core-2.11.1.jar), log4j 2.11.1

[*] Found CVE-2021-44228 vulnerability in /Users/shreyash/drools/kie-wb-distributions/business-central-parent/business-monitoring-webapp/target/business-monitoring-webapp.war (WEB-INF/lib/log4j-core-2.11.1.jar), log4j 2.11.1

[*] Found CVE-2021-44228 vulnerability in /Users/shreyash/drools/kie-wb-distributions/business-central-parent/business-monitoring-webapp/target/business-monitoring-webapp-thorntail.jar (m2repo/org/apache/logging/log4j/log4j-core/2.11.1/log4j-core-2.11.1.jar), log4j 2.11.1

[*] Found CVE-2021-44228 vulnerability in /Users/shreyash/drools/kie-wb-distributions/business-central-parent/business-monitoring-webapp/target/business-monitoring-webapp/WEB-INF/lib/log4j-core-2.11.1.jar, log4j 2.11.1


Scanned 15746 directories and 65246 files

Found 13 vulnerable files

Completed in 46.11 seconds


What do you suggest I should do here? I am using version 7.35 for both business-central as well as kie-server. 


Regards,
Shreyash

Matteo Mortari

unread,
Dec 13, 2021, 11:15:32 AM12/13/21
to drools-de...@googlegroups.com
Hello Shreyash,

My answer limited specifically to Drools, not something else.

In general, I suggest you periodically check with the KIE blog as if we will report any additional findings, for Drools or any other KIE related project such as Business Central that you are referring to, jBPM, etc, we're likely going to push them there: https://blog.kie.org

Hope this helps,
MM

Matteo Mortari

unread,
Dec 13, 2021, 1:52:55 PM12/13/21
to drools-de...@googlegroups.com

We invite you to keep monitoring the blog post, in the case there might be in the future any further findings.

Hope this helps,
MM

Reply all
Reply to author
Forward
0 new messages