Create
cancel
Showing results for 
Search instead for 
Did you mean: 
Sign up Log in
Celebration

Earn badges and make progress

You're on your way to the next level! Join the Kudos program to earn points and save your progress.

Deleted user Avatar
Deleted user

Level 1: Seed

25 / 150 points

Next: Root

Avatar

1 badge earned

Collect

Participate in fun challenges

Challenges come and go, but your rewards stay with you. Do more to earn more!

Challenges
Coins

Gift kudos to your peers

What goes around comes around! Share the love by gifting kudos to your peers.

Recognition
Ribbon

Rise up in the ranks

Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!

Leaderboard

Come for the products,
stay for the community

The Atlassian Community can help you and your team get more value out of Atlassian products and practices.

Atlassian Community about banner
4,463,430
Community Members
 
Community Events
176
Community Groups

Is Jira server vulnerable to CVE-2021-44228

I'm keeping an eye on this question. Is there any information about the potential impact of CVE-2021-44228 on Jira Core Server versions?

 

3 answers

2 accepted

Hi all,

Daniel with Atlassian Support here to let you know our security team has finished its investigation. We have an official response statement here on Community, which you can access at this link.

Additionally there is more information available on our advisory page, as well as the previously-published FAQ:

Thanks,
Daniel Eads | Atlassian Support

0 votes
Answer accepted
Daniel Eads Atlassian Team Dec 10, 2021

Hi all,

Daniel from Atlassian Support here. I'd just like to provide you with this preliminary FAQ related to the log4j zero-day. Our Security team is currently investigating the impact of the Log4j remote code execution vulnerability (CVE-2021-44228) and determining any possible impacts. In the meantime, hopefully this FAQ will help address some initial questions you may have.

Thanks,
Daniel Eads | Atlassian Support

0 votes

Hi @James 

Welcome to the Community! I would keep an eye on that post but honestly once Atlassian recognizes it they will send out an email usually to the billing account person on your account if your instance is vulnerable. They will also post https://confluence.atlassian.com/security with the vulnerability and the affected versions.

There's already a few posts about this and it would be really hard for them to respond to each individually.

 

Best,
Clark

Roger that, Thanks!

A possibility is to add "-Dlog4j2.formatMsgNoLookups=true" to the JVM startup parameters in setup.sh which I am guessing Atlassian will eventually tell us to do...

 

https://securityonline.info/apache-log4j2-remote-code-execution-vulnerability-alert/

 

Edit: this property only applies to log4j version 2.10 to 2.14 so would not help as jira/confluence use an older version. Refer to the Atlassian FAQ posted by Daniel.

There is a jar (\Atlassian\JIRA\atlassian-jira\WEB-INF\lib\log4j2-stacktrace-origins-2.2-atlassian-2.jar) that apparently refers to the version 2.x

Like Mohan Sundar likes this

Suggest an answer

Log in or Sign up to answer
DEPLOYMENT TYPE
SERVER
TAGS

Atlassian Community Events