{"id":204,"date":"2021-12-22T09:50:15","date_gmt":"2021-12-22T08:50:15","guid":{"rendered":"https:\/\/www.covalgo.at\/blog\/?p=204"},"modified":"2021-12-22T10:12:18","modified_gmt":"2021-12-22T09:12:18","slug":"polarion-not-affected-by-log4j-log4shell","status":"publish","type":"post","link":"https:\/\/www.covalgo.at\/blog\/2021\/12\/22\/polarion-not-affected-by-log4j-log4shell\/","title":{"rendered":"Polarion: Not affected by Log4j (&#8222;Log4Shell&#8220;)"},"content":{"rendered":"\n<p>On 2021-12-09, a vulnerability in Apache Log4j (a logging tool used in many Java-based applications)<br>was disclosed, that could allow remote unauthenticated attackers to execute code on vulnerable systems.<br>The vulnerability is tracked by Siemens as CVE-2021-44228 and is also known as \u201cLog4Shell\u201d.<\/p>\n\n\n\n<p><br>On 2021-12-14 an additional denial of service vulnerability (CVE-2021-45046) was published rendering<br>the initial mitigations and fix in version 2.15.0 as incomplete under certain non-default configurations.<br>Log4j versions 2.16.0 and 2.12.2 are supposed to fix both vulnerabilities.<\/p>\n\n\n\n<p><br>On 2021-12-17, CVE-2021-45046 was reclassified with an increased CVSS base score (from 3.7 to 9.0).<br>The potential impact of CVE-2021-45046 now includes &#8211; besides denial of service &#8211; also information<br>disclosure and local (and potential remote) code execution.<\/p>\n\n\n\n<p><br>Siemens is currently investigating to determine which products are affected and is continuously updating<br>this advisory as more information becomes available.<\/p>\n\n\n\n<p class=\"has-large-font-size\"><strong>Polarion is not affected!<\/strong><\/p>\n\n\n\n<p>Find more details: <a href=\"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-661247.pdf\">https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-661247.pdf<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>On 2021-12-09, a vulnerability in Apache Log4j (a logging tool used in many Java-based applications)was disclosed, that could allow remote unauthenticated attackers to execute code on vulnerable systems.The vulnerability is tracked by Siemens as CVE-2021-44228 and is also known as \u201cLog4Shell\u201d. On 2021-12-14 an additional denial of service vulnerability (CVE-2021-45046) was published renderingthe initial mitigations [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,7],"tags":[15,10],"class_list":["post-204","post","type-post","status-publish","format-standard","hentry","category-allgemein","category-application-life-cycle-management","tag-log4j","tag-polarion"],"_links":{"self":[{"href":"https:\/\/www.covalgo.at\/blog\/wp-json\/wp\/v2\/posts\/204","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.covalgo.at\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.covalgo.at\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.covalgo.at\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.covalgo.at\/blog\/wp-json\/wp\/v2\/comments?post=204"}],"version-history":[{"count":6,"href":"https:\/\/www.covalgo.at\/blog\/wp-json\/wp\/v2\/posts\/204\/revisions"}],"predecessor-version":[{"id":211,"href":"https:\/\/www.covalgo.at\/blog\/wp-json\/wp\/v2\/posts\/204\/revisions\/211"}],"wp:attachment":[{"href":"https:\/\/www.covalgo.at\/blog\/wp-json\/wp\/v2\/media?parent=204"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.covalgo.at\/blog\/wp-json\/wp\/v2\/categories?post=204"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.covalgo.at\/blog\/wp-json\/wp\/v2\/tags?post=204"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}