Update: LOG4J – Watermelon
| 1 min
When Watermelon became aware of the Log4Shell vulnerability (CVE-2021-44228), we began investigating our systems to determine if there was any impact to them.
As of December 13, 4:00 p.m., the following is the status of our investigation:
Component | Status |
Watermelon platform | All components of the Watermelon platform are unaffected |
Chatbot Engine | All components of the Chatbot Engine are unaffected |
Messaging API | All components of the Messaging API are unaffected |
Database | All components of the Database are unaffected |
Payments | All components of the Payments are unaffected |
This means that Watermelon as a platform and all the components we use are unaffected by this vulnerability. Though watermelon uses MongoDB to store non-confidential data, the affected functionality is not used by us.
If you have any questions, please contact our support department.