Are you in the loop? Keep up with the latest by making sure you're subscribed to Community Announcements. Just click Watch and select Articles.

×
Create
cancel
Showing results for 
Search instead for 
Did you mean: 
Sign up Log in
Celebration

Earn badges and make progress

You're on your way to the next level! Join the Kudos program to earn points and save your progress.

Deleted user Avatar
Deleted user

Level 1: Seed

25 / 150 points

Next: Root

Avatar

1 badge earned

Collect

Participate in fun challenges

Challenges come and go, but your rewards stay with you. Do more to earn more!

Challenges
Coins

Gift kudos to your peers

What goes around comes around! Share the love by gifting kudos to your peers.

Recognition
Ribbon

Rise up in the ranks

Keep earning points to reach the top of the leaderboard. It resets every quarter so you always have a chance!

Leaderboard

CVE-2020-9488 remediation / general question

Laurie Sciutti
Rising Star
Rising Star
Rising Stars are recognized for providing high-quality answers to other users. Rising Stars receive a certificate of achievement and are on the path to becoming Community Leaders.
Oct 19, 2023

Hello Community!   Per list-of-security-vulnerabilities-addressed-in-atlassian-log4j1 , the mitigation notes for CVE-2020-9488 indicate the following:  

 

Not vulnerable in the default configuration.

If you're using Log4j to email errors to admins, as a workaround, set the mail.smtp.ssl.checkserveridentity system property to true.

 

Question:  how do we know if we're using the default config or if we're using log4j to email errors to admins?

1 answer

1 accepted

2 votes
Answer accepted
Laurie Sciutti
Rising Star
Rising Star
Rising Stars are recognized for providing high-quality answers to other users. Rising Stars receive a certificate of achievement and are on the path to becoming Community Leaders.
Oct 19, 2023

For anyone who's curious, per Atlassian Support:

If you would like to know if you are using default configuration or using log4j for sending email errors to admins:

  • Jira uses the logging module log4j to output log statements from applications to various output targets.  By default, these log outputs are written to various Jira logs, but the module can also be configured and customized to do other things, such as email log information via SMPT using the SMTPAppender.

 

That said, by default, Jira does not use the SMTPAppender to send log information via SMTP email. 

Ultimately, if you've never configured the appender for SMTP in Log4j's configuration file (log4j.properties), you shouldn't have to worry about the CVE applying to your instance.

However, if you'd like to verify, you can look at Jira's log4j.properties file in Jira's installation directory to confirm if the appender is enabled inside the log4j.properties file.

The setting begins with a line that should look very similar to this:

log4j.appender.mail=org.apache.log4j.net.SMTPAppender

  • Default location:  <jira-application-dir>/atlassian-jira/WEB-INF/classes/log4j.properties
  • If you don't see SMTPAppender setup in log4j.properties, then your instance is not sending log4j output via the SMTPAppender. 

 

Additionally, if you'd like to remain on the side of caution, then you can always setup the JVM argument: 

-Dmail.smtp.ssl.checkserveridentity=true

  • When the property is set to "true," the client verifies during the SSL handshake that the domain name on the server matches the domain name in the server's SSL certificate.
  • By confirming that the server you're connecting to is, in fact, the one it purports to be, it adds an extra degree of protection. The connection is not made if the check fails.

Suggest an answer

Log in or Sign up to answer
DEPLOYMENT TYPE
SERVER
TAGS
AUG Leaders

Atlassian Community Events