Dear VIVO users,
On December 9th, 2021, a 0-day exploit in the popular Java logging library log4j was discovered that results in Remote Code Execution (RCE) by logging a certain string.
The impact of this vulnerability is quite severe. More about this issue impact (somewhere called Log4Shell) might be found at https://www.randori.com/blog/cve-2021-44228/.
The VIVO core source code is not impacted by this vulnerability, but the Solr platform used by VIVO might be. The list of Solr version affected by this vulnerability and instructions how to mitigate this vulnerability and patch yourself quickly are provided at https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228. If you are using a docker instance of Solr the solution might be this one: https://vivo-project.slack.com/archives/C8RL9L98A/p1639495347144900?thread_ts=1639428593.142600&cid=C8RL9L98A.
Sincerely,
Dragan Ivanovic
The VIVO tech lead