6969 <cpe >cpe:/a:apache:log4j</cpe >
7070 <cve >CVE-2022-23305</cve >
7171 </suppress >
72- <!--
73- java-8 Integration - content required for successful owasp dependency-check execution
74- MISSING Security Bulletin content!
75-
7672 <suppress >
7773 <notes ><![CDATA[
7874 This suppresses CVE-2022-23307 for the log4j-1.2.17.jar dependency. ESAPI's
79- default configuration uses ConsoleAppender rather than Chainsaw and
80- thus does not use Log4J 1 in a manner that makes it exploitable. ESAPI is unable to
81- eliminate the dependency completely because our our deprecation policy.
75+ default configuration uses ConsoleAppender. It does not use Apache Chainsaw, which
76+ is a GUI log viewer. ESAPI is unable to eliminate the dependency completely because
77+ our our deprecation policy.
8278
8379 For further details, please see:
8480 https://nvd.nist.gov/vuln/detail/CVE-2022-23307 and
85-
86- -> NEEDS BULLETIN REFERENCE
81+ Security Bulletin 10 (to be written).
8782
8883 ]]> </notes >
8984 <gav regex =" true" >^log4j:log4j:1\.2\.17$</gav >
@@ -93,22 +88,21 @@ MISSING Security Bulletin content!
9388 <suppress >
9489 <notes ><![CDATA[
9590 This suppresses CVE-2022-23302 for the log4j-1.2.17.jar dependency. ESAPI's
96- default configuration uses ConsoleAppender rather than JMSAppender and
97- thus does not use Log4J 1 in a manner that makes it exploitable. ESAPI is unable to
98- eliminate the dependency completely because our our deprecation policy.
99- By virtue of not using a JMSAppender, the exploitable nature of the JMSSink implementation
100- referenced by this CVE is also mitigated .
91+ default configuration uses ConsoleAppender rather than JMSAppender. Likewise,
92+ JMSSink, which is standalone Apache Log4J 1 application, is not used by ESAPI
93+ at all. Thus this vulnerability isnot exploitable via the delivered default
94+ configuration for ESAPI. ESAPI is unable to eliminate the dependency completely
95+ because our our deprecation policy .
10196
10297 For further details, please see:
10398 https://nvd.nist.gov/vuln/detail/CVE-2022-23302
104- -> NEEDS BULLETIN REFERENCE
99+ https://github.com/ESAPI/esapi-java-legacy/blob/develop/documentation/ESAPI-security-bulletin9.pdf
105100
106101 ]]> </notes >
107102 <gav regex =" true" >^log4j:log4j:1\.2\.17$</gav >
108103 <cpe >cpe:/a:apache:log4j</cpe >
109104 <cve >CVE-2022-23302</cve >
110105 </suppress >
111- -->
112106 <suppress >
113107 <notes ><![CDATA[
114108 ESAPI does not use this jar directly. It is a transitive dependency of AntiSamy and (as per Dave Wichers on
0 commit comments