STATEMENT FROM ELB LEARNING REGARDING “LOG4J” VULNERABILITY
12 December 2021
On December 9, 2021, a severe remote code execution vulnerability within Apache's Log4j was announced (AKA log4shell). Log4j is a widely used logging framework that could impact any application that directly uses, or relies on an application that uses, Java and this framework.
ELB Learning has conducted an analysis of the possible impact on all software applications we offer. We are pleased to state that there are NO VULNERABILITIES to our software applications.
Applications:
Asset Library - NOT VULNERABLE
CenarioVR - NOT VULNERABLE
CourseMill - NOT VULNERABLE *
eLearning Brothers Account Portal - NOT VULNERABLE
Lectora Desktop - NOT VULNERABLE
Lectora Online - NOT VULNERABLE
ReviewLink - NOT VULNERABLE
Rockstar Community - NOT VULNERABLE
Rockstar Learning Platform - NOT VULNERABLE
The Game Agency / The Training Arcade® - NOT VULNERABLE
If you need any further information regarding this matter, please feel free to email info@elblearning.com.
Note: Content published by Lectora or Lectora Online is NOT VULNERABLE.
Note: for CourseMill Enterprise versions prior to 8.5.7 customers, log4j-core is loaded as a library, but it is not used anywhere within the application. This file may be deleted. Delete: WEB-INF/lib/log4j-core-2.0-rc1.jar Restart tomcat.
Reference:
Log4j Vulnerability https://logging.apache.org/log4j/2.x/security.html