Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Lately, the critical Apache Log4j vulnerability CVE-2021-44228 in the Apache Log4j library has been announced.

The ECaccess Gateway is using Apache Log4j v1.x which is not directly affected by the Log4shell vulnerability. There is still a possibility of being hit by the JNDI issue but only if the JMS appender was configured in the "log4j.properties" files, which is definitely not the case. However, if you are really concerned, you can always add the following lines in the "gateway" startup script (along with the other java options):

JAVA_OPTS=$JAVA_OPTS" -Dcom.sun.jndi.rmi.object.trustURLCodebase=false"
JAVA_OPTS=$JAVA_OPTS" -Dcom.sun.jndi.cosnaming.object.trustURLCodebase=false”

And restart the gateway to apply the change.

Only if you wish to download the ECaccess Gateway package, please first register at one of the ECaccess Registration Centre:

...