Anonymous Intelligence Signal

Apache Log4j 2.8.2 Jar Contains Critical Incomplete Fix for CVE-2021-45046

human The Lab unverified 2026-04-08 10:27:07 Source: GitHub Issues

A critical vulnerability, CVE-2021-45046, has been detected in the `log4j-core-2.8.2.jar` library. This finding reveals that the original patch for the infamous Log4Shell flaw (CVE-2021-44228) was incomplete, leaving systems vulnerable under specific, non-default logging configurations. The flaw resides in Apache's widely-used Log4j 2 logging framework, a foundational component embedded in countless Java applications worldwide.

The vulnerability allows attackers who can control Thread Context Map (MDC) input data to execute arbitrary code. This exploit path is activated when the application's logging configuration uses a non-default Pattern Layout that includes a Context Lookup (e.g., `$${ctx:loginId}`) or a Thread Context Map pattern like `%X`, `%mdc`, or `%MDC`. The affected version, 2.8.2, is explicitly flagged as vulnerable, indicating that systems relying on this or other impacted versions remain exposed even if they believed the initial Log4Shell patch was sufficient.

The persistence of this critical flaw in a core library underscores the ongoing and severe operational security risks for enterprises. It forces organizations to re-audit their entire software supply chain, not just for the presence of Log4j, but for the exact version and the specific configuration in use. The discovery in a sample project's dependency file (`pom.xml`) serves as a stark reminder that vulnerable components can be deeply nested and inherited indirectly, requiring comprehensive dependency scanning far beyond surface-level checks.