G8DHE wrote:In that case it seems to me from the write-ups that Subsonic will only be affected by the exploits dating from 2019 and not the latest problems - unless anyone knows better ?
Correct. And the Log4j1 serialization vulnerability requires that the software have an open log4j.net.SocketServer and that that port is reachable by the attacker. In my install (running in a docker on Unraid), subsonic is listening on ports 4040 (the web interface) and also ports 9412, 38629, 34185, and 40973. I have no idea why it is listening on those other ports, but the only port I have forwarded into it from my border firewall is 4040, so even if one of those other ports are a log4j.net.SocketServer, the only people who would be able to hit it are on my internal network.
I am not concerned about that attack vector personally.
(NB: While network security is my profession, and Log4J2 has been my focus for the past 5 days, I do not have the code, so I am only reporting on what I can see from external diagnostic and forensic techniques)
Glenn