Legacy Knowledge Base
Published Jul. 2, 2025

How to verify that a Log4j patch has resolved all Log4j vulnerabilities

Written By

Neil Cuzon

How To articles are not official guidelines or officially supporteddocumentation. They are community-contributed content and may not alwaysreflect the latest updates to Liferay DXP. We welcome your feedback toimprove How to articles!

While we make every effort to ensure this Knowledge Base is accurate, itmay not always reflect the most recent updates or official guidelines.We appreciate your understanding and encourage you to reach out with anyfeedback or concerns.

Legacy Article

You are viewing an article from our legacy "FastTrack"publication program, made available for informational purposes. Articlesin this program were published without a requirement for independentediting or verification and are provided "as is" withoutguarantee.

Before using any information from this article, independently verify itssuitability for your situation and project.

NOTE: This article is an INTERNAL article and is not visible to customers, currently. Please only link this article in internal comments, but not public comments.

Issue

  • How can users check if the patch that they’ve applied has eliminated all instances of the log4j vulnerability? 

Environment

  • DXP 7.1 
  • DXP 7.2
  • DXP 7.3

Resolution

 Here are the steps to check if a log4j hotfix has resolved the targeted vulnerabilities:

To search for vulnerabilities caused by: CVE-2021-45105, CVE-2019-17571,CVE-2020-9488,CVE-2021-4104 and CVE-2019-17571

How to check your Elasticsearch Connector:

  1. Install patch
  2. Go to osgi/marketplace
  3. Search for "Elasticsearch". There should be multiple results.
  1. Open the "Liferay Foundation - Liferay Connector to Elasticsearch X - Impl.lpkg", where "X" is 6 and/or 7.
  2. Navigate to "com.liferay.portal.search.elasticsearchX.impl-5.0.21.hotfix-YYYY-ZZZZ.jar" and open the archive.
  3. Navigate to /lib/ and view the log4j jars.
  4. You should see log4j-api-2.17.0.jar and log4j-core-2.17.0.jar
  5. You should NOT see any other log4j .jar files

If you find that there are other log4j instances than the ones listed above, please request for the following fixes: LPE-17451 and LPE-17270

How to search for vulnerabilities caused by: CVE-2019-17571,CVE-2020-9488,CVE-2021-4104

  1. Install patch
  2. Go to tomcat-9.0.37/webapps/ROOT/WEB-INF/lib and find the "log4j.jar" file (or just search for it)
  3. You should not find any instances of “log4j.jar”
  4. Search instead for reload4j.jar, as this is the new component that Liferay uses for logging.

If you find that there are any log4j instances, please request for this fix: LPE-17063 

Additional Information

Did this article resolve your issue ?

Legacy Knowledge Base