A critical vulnerability was discovered in Log4j, a widely used Apache logging framework. This library is used in applications worldwide, including Flow, which is vulnerable to exploitation of this Apache bug. MultiTrans does not use Java, so it is not affected by this vulnerability and no action is required. Flow is affected by this vulnerability, and if it is installed on your server, we encourage you to mitigate the risk immediately. To check whether Flow is installed on your server, look for MultiTrans Flow in the list of installed programs: |
Steps to mitigate this vulnerability:
You can validate that the above steps were successful by monitoring the log file at C:\Program Files\Donnelley\MultiTrans Flow 64\runtime\logs\error.log. The following will appear: INFO [main] org.apache.catalina.startup.VersionLoggerListener.log Command line argument: -Dlog4j2.formatMsgNoLookups=true This configuration change will be added by default to the January release of MultiTrans 7.0, therefore following that release, MultiTrans will not be susceptible to this exploit. The Java framework in MultiTrans will also be upgraded in the January release for security purposes. The Log4J library will be updated in a future release of MultiTrans, following a full investigation of the ramifications of this upgrade. |