Please direct this email to the appropriate Aspose contact for review and response.
Napersoft was made aware of the vulnerability being tracked as CVE-2021-4104 (https://nvd.nist.gov/vuln/detail/CVE-2021-4104). Per that CVE, "JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.”
Vendor Name : Aspose
Product: Aspose.Total for Java 2021-05-01
We ask that you please provide responses to the following questions by end of day 1/28/2022.
Acknowledge receipt of this query:
Have you taken steps to identify whether this vulnerability exists in your code base
- Not started
- In Progress
Have you engaged relevant 3rd parties that develop software as applicable
Confirm that you will advise Napersoft regarding the timeline to deploy patches for the compilers/programming languages as they become available:
Have you detected exploitation of this vulnerability
If exploitation detected, is there any potential exposure to Napersoft
- Yes (please explain)
- Evaluation in Progress