-
Notifications
You must be signed in to change notification settings - Fork 258
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SonarQube 9.2(Current) and earlier are vulnerable #58
Comments
I believe that they have stated that they are not affected. https://community.sonarsource.com/t/sonarqube-sonarcloud-and-the-log4j-vulnerability/54721 Edit: "Regarding all the other questions about non-latest, non-LTS versions, again, only latest (9.2.1) and LTS (8.9.3) are supported. We have not investigated other versions, since we don’t support them. If you have concerns, you should upgrade." |
While they are not directly affected, they contain a version of elastic search that contains a version of log4j that is. It is easy to mitigate with the sonar.search.javaAdditionalOpts=-Dlog4j2.formatMsgNoLookups=true setting. I decided to post this so industry partners that may be using SonarQube will know to check and ensure that flag is set. |
Is the topic of this ticket correct? Is the current (9.2) version of SonarQube vulnerable? |
If the intent of this thread is to track attack surface, then it is valid to note that this application contains potential attack surface. If you would like to chalk this one up to duplicate for Elasticsearch, then that's fine. Noting dependency vulns may help prevent a breach for someone using this product. |
They contain log4j 2.11.1
The text was updated successfully, but these errors were encountered: