After implementing the “IFS Solution ID 298974” from
Impact of CVE-2021-44228 on IFS Products, Services | IFS Community
the “Verification instructions” is:
Using a search engine like AgentRansack that can search within compressed files, scan the IFS-Home for instances of the JndiLookup.class (including instances within .jar, .ear and .war files)
But there are a number of “log4j-core-2.8.2.jar” (CVE-2021-44228) still being used in the application. By searching the associated handles in the resource manager, there is about 6 process running per environment.
Is there any plan/recommendations of these files?