AsposeTotal for Java CVE-2021-4104 Vulnerability

Please direct this email to the appropriate Aspose contact for review and response.

Napersoft was made aware of the vulnerability being tracked as CVE-2021-4104 (NVD - CVE-2021-4104). Per that CVE, "JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default. Apache Log4j 1.2 reached end of life in August 2015. Users should upgrade to Log4j 2 as it addresses numerous other issues from the previous versions.”

Vendor Name : Aspose

Product: Aspose.Total for Java 2021-05-01

We ask that you please provide responses to the following questions by end of day 1/28/2022.

Acknowledge receipt of this query:

Have you taken steps to identify whether this vulnerability exists in your code base

  • Not started
  • In Progress
  • Completed

Have you engaged relevant 3rd parties that develop software as applicable

  • Yes
  • No

Confirm that you will advise Napersoft regarding the timeline to deploy patches for the compilers/programming languages as they become available:

Have you detected exploitation of this vulnerability

  • Yes
  • No

If exploitation detected, is there any potential exposure to Napersoft

  • Yes (please explain)
  • No
  • Evaluation in Progress

@sherter,

Please note, Aspose for Java APIs do not use your mentioned vulnerability or other such vulnerabilities. Aspose for Java APIs are not effected by it. Log4J is not used in Aspose.Total for Java APIs. We recommend using the latest available versions of the Aspose for Java APIs. If you find any issue regarding this or other vulnerabilities, let us know with details and we will check the issue immediately.