Details
Description
As recommended in
https://www.linuxsecrets.com/owasp-wiki/index.php/Injection_Prevention_Cheat_Sheet_in_Java.html#Example_using_Log4j2
to prevent log injections of CRLF or HTML code (which could be exploited if the logs are displayed in an HTML page), we should change the default log4j2 pattern in Karaf from:
log4j2.pattern = %d{ISO8601} | %-5p | %-16t | %-32c{1} | %X{bundle.id} - %X{bundle.name} - %X{bundle.version} | %m%n
to something like this:
log4j2.pattern = %d{ISO8601} | %-5p | %-16t | %-32c{1} | %X{bundle.id} - %X{bundle.name} - %X{bundle.version} | %encode{%.-500m}%n
See :
This would limit the message to 500 characters to prevent sending huge messages and will turn on the default HTML escaping which escapes for CRLF and any HTML tags such as <script>