<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: log4j - CVE-2021-45105 in ArcGIS Enterprise Questions</title>
    <link>https://community.esri.com/t5/arcgis-enterprise-questions/log4j-cve-2021-45105/m-p/1128510#M32098</link>
    <description>&lt;P&gt;Thank you. I saw that the blog article had an update today.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;from the blog ... "Initial Post 12/12/21 – Last Updated 12/22/21 – 10:30am PT"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I saw that the guidance re: CVE-2021-45105 is still to implement a WAF. Hopefully other recommendations will be coming soon.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 23 Dec 2021 00:02:58 GMT</pubDate>
    <dc:creator>JoePlattner</dc:creator>
    <dc:date>2021-12-23T00:02:58Z</dc:date>
    <item>
      <title>log4j - CVE-2021-45105</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-questions/log4j-cve-2021-45105/m-p/1128127#M32082</link>
      <description>&lt;P&gt;I've been asked to look into assisting with mitigating CVE-2021-45105 in our ARCGIS enterprise environment. Searching log4j, I did not find any other discussions relating to this specific CVE so I'm asking it here.&lt;/P&gt;&lt;P&gt;The python script only seems to address &lt;SPAN&gt;CVE-2021-44228 and CVE-2021-45046.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Anyone else working on this, or have a solution?&lt;/P&gt;&lt;P&gt;The ESRI blog referencing this reccomends applying&amp;nbsp;&lt;SPAN&gt;Web Application Firewall rules to mitigate this. ESRI tech support (even our premium support tier) is unable to advise or assist us with these firewall rules.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;So I've forwarded the Web Application Firewall doc included in the log4j blog post from ESRI&amp;nbsp; to our network team, and while I'm waiting for them to get back to me, I thought I'd see if anyone else has done anything on this specific CVE.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Dec 2021 20:21:06 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-questions/log4j-cve-2021-45105/m-p/1128127#M32082</guid>
      <dc:creator>JoePlattner</dc:creator>
      <dc:date>2021-12-21T20:21:06Z</dc:date>
    </item>
    <item>
      <title>Re: log4j - CVE-2021-45105</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-questions/log4j-cve-2021-45105/m-p/1128371#M32091</link>
      <description>&lt;P&gt;We are nearing our investigation regarding this issue and plan to update our Log4J statement later today to include information regarding CVE-2021-45105.&lt;/P&gt;</description>
      <pubDate>Wed, 22 Dec 2021 17:35:40 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-questions/log4j-cve-2021-45105/m-p/1128371#M32091</guid>
      <dc:creator>RandallWilliams</dc:creator>
      <dc:date>2021-12-22T17:35:40Z</dc:date>
    </item>
    <item>
      <title>Re: log4j - CVE-2021-45105</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-questions/log4j-cve-2021-45105/m-p/1128510#M32098</link>
      <description>&lt;P&gt;Thank you. I saw that the blog article had an update today.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;from the blog ... "Initial Post 12/12/21 – Last Updated 12/22/21 – 10:30am PT"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;I saw that the guidance re: CVE-2021-45105 is still to implement a WAF. Hopefully other recommendations will be coming soon.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Joe&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Dec 2021 00:02:58 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-questions/log4j-cve-2021-45105/m-p/1128510#M32098</guid>
      <dc:creator>JoePlattner</dc:creator>
      <dc:date>2021-12-23T00:02:58Z</dc:date>
    </item>
    <item>
      <title>Re: log4j - CVE-2021-45105</title>
      <link>https://community.esri.com/t5/arcgis-enterprise-questions/log4j-cve-2021-45105/m-p/1128519#M32099</link>
      <description>&lt;P&gt;Just checking what other vendors have suggested.&lt;/P&gt;&lt;P&gt;The specific flaw exists within the StrSubstitutor class. The issue results from the lack of proper validation of user-supplied data, which can result in a resource exhaustion condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the process.&lt;/P&gt;&lt;P&gt;recommends write-protecting Log4j configuration files.&lt;/P&gt;&lt;P&gt;My question would be for ESRI - Is removal of the StrSubstitutor class an option?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Dec 2021 01:18:30 GMT</pubDate>
      <guid>https://community.esri.com/t5/arcgis-enterprise-questions/log4j-cve-2021-45105/m-p/1128519#M32099</guid>
      <dc:creator>BrianParker2</dc:creator>
      <dc:date>2021-12-23T01:18:30Z</dc:date>
    </item>
  </channel>
</rss>

