Security Advisory 2021-17
|Summary||Octopus Java Client SDK log4j 2.16.0 dependency (CVE-2021-45105)|
|Discovery Date||19 Dec 2021|
|Patch Release Date||19 Dec 2021|
|Advisory Release Date||20 Dec 2021|
|Product||Octopus Java SDK|
|Operating System||Linux and Windows|
|CVE ID||CVE-2021-45105 (Apache Software Foundation)|
Customers who have upgraded Octopus Java SDK to version 0.0.5 or higher are not affected.
Octopus Deploy has given this vulnerability a low rating. This rating was given according to the Octopus Deploy security levels, which ranks vulnerabilities as critical, high, medium, or low severity.
This is our assessment and you should evaluate its applicability to your own environment.
Another denial of service vulnerability in log4j has been found in version 2.16.0 (CVE-2021-45105 which has been patched in 2.17.0. A new version of the Octopus Java SDK has been released to address the new vulnerability.
The versions of Octopus Java SDK affected by this vulnerability are:
To address this vulnerability, we have released Octopus Java SDK version:
- 0.0.5 that contains a fix for these issues.
The latest versions of the Octopus Java SDK can be downloaded from https://packages.octopushq.com/ui/native/maven
What You Need to Do
Octopus Deploy recommends that you upgrade to the latest version (0.0.5). You can download the latest version of from https://packages.octopushq.com/ui/native/maven
The previous mitigation provided were discovered to only limit exposure. There is no known mitigation for CVE-2021-45105, it is important to upgrade to a fixed version as soon as possible.
If you have any questions or concerns regarding this advisory, please contact our support team (https://octopus.com/support).