Apache Log4j2 versions 2.0-beta7 through 2.17.0… are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.
As you pointed out in the excerpt from the CVE report the issue is fixed in 2.17.1. Latest Sonarqube LTS 8.9.9 is running 2.17.0. Are there any plans to update the Elasticsearch version to the one that’s using >= 2.17.1? Should this be still sent to security@sonarsource.com or is there any other authoritative way to submit a feature request?
As already explained in this thread, Elasticsearch was updated in SonarQube 9.3 (SONAR-15869) to avoid false positives from security tools regarding CVE-2021-44832. There’s no plan to update Elasticsearch in the 8.9.x LTS for this topic.
You’ll find the explanation here: