Update: LOG4J – WatermelonLeestijd: < 1 minuut
When Watermelon became aware of the Log4Shell vulnerability (CVE-2021-44228), we began investigating our systems to determine if there was any impact to them.
As of December 13, 4:00 p.m., the following is the status of our investigation:
|Watermelon platform||All components of the Watermelon platform are unaffected|
|Chatbot Engine||All components of the Chatbot Engine are unaffected|
|Messaging API||All components of the Messaging API are unaffected|
|Database||All components of the Database are unaffected|
|Payments||All components of the Payments are unaffected|
This means that Watermelon as a platform and all the components we use are unaffected by this vulnerability. Though watermelon uses MongoDB to store non-confidential data, the affected functionality is not used by us.
If you have any questions, please contact our support department.