Hello Community! Per list-of-security-vulnerabilities-addressed-in-atlassian-log4j1 , the mitigation notes for CVE-2020-9488 indicate the following:
Not vulnerable in the default configuration.
If you're using Log4j to email errors to admins, as a workaround, set the mail.smtp.ssl.checkserveridentity
system property to true.
Question: how do we know if we're using the default config or if we're using log4j to email errors to admins?
For anyone who's curious, per Atlassian Support:
If you would like to know if you are using default configuration or using log4j for sending email errors to admins:
That said, by default, Jira does not use the SMTPAppender to send log information via SMTP email.
Ultimately, if you've never configured the appender for SMTP in Log4j's configuration file (log4j.properties), you shouldn't have to worry about the CVE applying to your instance.
However, if you'd like to verify, you can look at Jira's log4j.properties file in Jira's installation directory to confirm if the appender is enabled inside the log4j.properties file.
The setting begins with a line that should look very similar to this:
log4j.appender.mail=org.apache.log4j.net.SMTPAppender
Additionally, if you'd like to remain on the side of caution, then you can always setup the JVM argument:
-Dmail.smtp.ssl.checkserveridentity=true
You must be a registered user to add a comment. If you've already registered, sign in. Otherwise, register and sign in.