mirror of
https://github.com/NTifyApp/NTify.git
synced 2026-04-26 07:55:51 +03:00
[GH-ISSUE #116] Log4Shell (CVE-2021-44228) Status in NTify.jar? #91
Labels
No labels
In Progress
bug
enhancement
pull-request
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/NTify#91
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @WindowsXPSE on GitHub (Feb 17, 2026).
Original GitHub issue: https://github.com/NTifyApp/NTify/issues/116
Describe the bug
This is not a bug in NTify itself, but a general security concern for users running NTify on Windows XP. Many users (especially on old systems like XP) are still using potentially vulnerable or outdated Java 8 installations. The famous Log4Shell vulnerability (CVE-2021-44228) in Apache Log4j 2.x (versions ≤2.14.1) affected a huge number of Java applications in 2021–2022. Even though NTify might not directly bundle a vulnerable Log4j (I couldn't find any log4j-core.jar in the JAR via 7-Zip check), users could still be at risk if their Java runtime or other dependencies introduce it indirectly, or if future updates add logging that uses vulnerable libs. Adding a clear recommendation in the README would help protect XP users from running unsafe Java versions.
This would guide users away from downloading random/old/vulnerable Java installers from shady sites. Many XP users aren't aware of the risks anymore.
@werwolf2303 commented on GitHub (Feb 18, 2026):
I have looked into it and can say to 100% that NTify was never vulnerable to log4j because it uses slf4j and a custom logging implementation.
For the jdk itself I can't recommend using OpenJDK because it is at the implementation part a little bit different than Oracle JDK which renders the application unstable in some cases. h
What I can look into to is if the application has other exploitable vulnerabilities and upgrade them if possible or mention them in the README if not.
Thanks for bringing this up tho, I don't want to cause more vulnerabilities on an XP system
@theanthonydavenport commented on GitHub (Feb 26, 2026):
Well said.