CVE-2021-44228-Scanner: .jar Files not being fixed with --fix parameter
Using the --fix parameter is not working for the .jar file below:
C:\Program Files\Microsoft SQL Server\150\DTS\Extensions\Common\Jars\log4j-1.2.17.jar 1.2.17 POTENTIALLY_VULNERABLE
The output of log4j2-scan.exe (Ver. 2.2.0) looks like this:
C:\Temp\Logpresso\logpresso-log4j2-scan-2.2.0-win64>log4j2-scan.exe --fix "C:\Program Files\Microsoft SQL Server\150\DTS\Extensions\Common\Jars\log4j-1.2.17.jar"
Logpresso CVE-2021-44228 Vulnerability Scanner 2.2.0 (2021-12-18)
This command will remove JndiLookup.class from log4j2-core binaries. Are you sure [y/N]? y
Scanning directory: C:\Program Files\Microsoft SQL Server\150\DTS\Extensions\Common\Jars\log4j-1.2.17.jar
Scanned 0 directories and 1 files
Found 0 vulnerable files
Found 0 potentially vulnerable files
Found 0 mitigated files
Fixed 0 vulnerable files
Completed in 0.00 seconds
Every hint is highly appreciated.
Thank you.
About this issue
- Original URL
- State: closed
- Created 3 years ago
- Comments: 15 (7 by maintainers)
Use:
./log4j2-scan --scan-log4j1 --fix
After
--fix
has been applied, a new scan shows no mitigation note (mitigated)@latency0ms If SQL server uses JMS or socket logging feature, it can be damaged. In most cases, JMS or socket server feature is not used. However you should use this option at your own risk. I can’t figure out all the software configurations in the world.
This worked, could this lead to side effects? What exactly is being performed with
--scan-log4j1 --fix
?