Just wondering if there were any known log4j vulnerabilities if folks are using the OSM Overpass API? Haven't seen any official statements put out by OSM like for other organizations. Admittedly I can't see how there would be issues, but since it's not super clear from the Wiki (to a novice like myself) how the API is structured I figured I'd ask.

asked 09 Feb, 18:01

sillywizard's gravatar image

sillywizard
16113
accept rate: 0%

edited 09 Feb, 18:23


OSMF only manage the "core" openstreetmap.org servers, which run mostly on Ruby on Rails, with some C optimizations, so I don't think they will issue any statement regarding Log4j.

The OSM ecosystem is quite diverse and not centrally managed, so you'll need to check every software you use.

The Overpass API you mention looks to be mostly coded in C++, so I don't think there would any trouble there.

Anyway, if I understand correctly the Log4Shell exploit, the trouble would be for server's administrators, not users.

Disclaimer : I'm neither security nor Java expert.

Regards.

permanent link

answered 09 Feb, 18:48

H_mlet's gravatar image

H_mlet
4.5k1569
accept rate: 13%

Your answer
toggle preview

Follow this question

By Email:

Once you sign in you will be able to subscribe for any updates here

By RSS:

Answers

Answers and Comments

Markdown Basics

  • *italic* or _italic_
  • **bold** or __bold__
  • link:[text](http://url.com/ "title")
  • image?![alt text](/path/img.jpg "title")
  • numbered list: 1. Foo 2. Bar
  • to add a line break simply add two spaces to where you would like the new line to be.
  • basic HTML tags are also supported

Question tags:

×463
×274
×10

question asked: 09 Feb, 18:01

question was seen: 364 times

last updated: 09 Feb, 18:48

powered by OSQA