Skip to main content

Log4j Vulnerability - Please Post All Questions Here


Show first post

344 replies

Henke
Byte
Forum|alt.badge.img+13
  • Byte
  • 125 replies
  • December 15, 2021

Just a clearification.
If I download the latest maintenance release for the SP i’m running, in my case 11.24.23, then dowload the hotfix for LOG4J and add it to the software cache.

 

When I then update the clients there is only one step, both maintenance release, in my case .23, and the hotfix gets installed at the same time?

 

//Henke


Forum|alt.badge.img

My Commcell is 11.24.23 and last night i installed the hotfix 4550,4552,4553 when i do a search still see the older versions for LOG4J still in there, does any one know if Hotfix suppose to remove the old LOG4J version 

 

LOG4J older version Path still shows up are:

D:\Program Files\CommVault\Simpana\Apache\lib

D:\Program Files\CommVault\Simpana\CVCIEngine\CvPreviewHome\webapps\CvContentPreviewGenApp\WEB-INF\lib

D:\Program Files\CommVault\Simpana\MessageQueue\lib\optional

 

 


Mike Struening
Vaulter
Forum|alt.badge.img+23

@Laurent Labonte , @Vijay Gulge , we are looking into 2.16.  Once we have an official reply, I’ll update here (as well as edit the original post for posterity).


Mike Struening
Vaulter
Forum|alt.badge.img+23
Henke wrote:

Just a clearification.
If I download the latest maintenance release for the SP i’m running, in my case 11.24.23, then dowload the hotfix for LOG4J and add it to the software cache.

 

When I then update the clients there is only one step, both maintenance release, in my case .23, and the hotfix gets installed at the same time?

 

//Henke

That’s right.  Using Copy to Cache puts these into the central ‘bucket’ of updates.  Once you push updates out, CV applies the proper updates in that bucket, in the right order.  Nice and easy.


Mike Struening
Vaulter
Forum|alt.badge.img+23
NVKVadivelu wrote:

My Commcell is 11.24.23 and last night i installed the hotfix 4550,4552,4553 when i do a search still see the older versions for LOG4J still in there, does any one know if Hotfix suppose to remove the old LOG4J version 

 

LOG4J older version Path still shows up are:

D:\Program Files\CommVault\Simpana\Apache\lib

D:\Program Files\CommVault\Simpana\CVCIEngine\CvPreviewHome\webapps\CvContentPreviewGenApp\WEB-INF\lib

D:\Program Files\CommVault\Simpana\MessageQueue\lib\optional

 

 

Hi @NVKVadivelu .  There are 1.x versions of Log4j that are there, and this update does not remove them (as they are not affected by this specific vulnerability).  However, there are other CVEs that we are investigating, including ways to replace 1.x versions with the latest.

Once we know more, we’ll update here.


Mike Struening
Vaulter
Forum|alt.badge.img+23

@KGreer  thanks for that detail.  I updated the original post instructions mentioning to point to the folder created by the unzip!


Mike Struening
Vaulter
Forum|alt.badge.img+23

I added a FAQ into the original post which covers many of the recent questions.  If there’s anything the FAQ and post don’t cover, please don’t hesitate to ask.  As this evolves, I’ll keep collecting information, and answers.

Appreciate seeing our community coming together to assist and advise, ask and share :sunglasses:   you are all the best!


Forum|alt.badge.img
  • Bit
  • 3 replies
  • December 15, 2021

I updated our entire CV infrastructure including the hyperscale 1.5 and X appliances. For some reason our internal scans are still showing that two nodes have the Log4J vulnerability. The Linux nodes show 4553 applied but not 4551. Should both of these have been applied to hyperscale nodes and any other Linux nodes? Same with Windows I am only seeing 4553 and not 4552. 

Scan Output

Path : /usr/local/hedvig/server/lib/hedvig.jar
Installed version : 2.11.1
Fixed version : 2.15.0

11.24

11.24.23

11.24 Log4J Fix

4552

4553

4551

4553


Mike Struening
Vaulter
Forum|alt.badge.img+23

@JohnK , appreciate you sharing!  We are looking into this and will update once there’s an answer!


Forum|alt.badge.img+6
  • Byte
  • 23 replies
  • December 15, 2021

I don't know if this falls into this category or if this is something else completely different, one of our departments is saying our servers we use for Commvault are using log4shell v1.2x. They need to update it to v2.16.0. Is this related to this topic? Does Commvault support this version of log4shell?


Forum|alt.badge.img
  • Bit
  • 3 replies
  • December 15, 2021

@TP_Erickson I thought I read in an earlier post that v1.2 has been deprecated since 2015 or so. And per this link sounds about right. https://logging.apache.org/log4j/1.2/download.html


Forum|alt.badge.img+6
  • Byte
  • 23 replies
  • December 15, 2021
JohnK wrote:

@TP_Erickson I thought I read in an earlier post that v1.2 has been deprecated since 2015 or so. And per this link sounds about right. https://logging.apache.org/log4j/1.2/download.html

Im green when it comes to this topic. is this log4shell a third party app which the server has installed prior to Commvault software, or is this something that Commvault installs, and is resolved by updating the Commvault software? Thats where the confusion comes into play for me, because it comes down to weather or not the department that brought this up is asking us for permissions to update it, or if this is something to do with commvault software which my team needs to handle?


Forum|alt.badge.img+8
  • Vaulter
  • 53 replies
  • December 15, 2021
TP_Erickson wrote:

I don't know if this falls into this category or if this is something else completely different, one of our departments is saying our servers we use for Commvault are using log4shell v1.2x. They need to update it to v2.16.0. Is this related to this topic? Does Commvault support this version of log4shell?

1.x is not affected by this vulnerability, our updates are specifically targeting the CVSS 10 vulnerability and therefore updates the affected 2.x versions.  We are however investigating upgrade paths for 1.x nonetheless … this will be addressed separately.  In cases like HyperScale 1.x log4j are still maintained and supported by RedHat.


Forum|alt.badge.img+6
  • Byte
  • 23 replies
  • December 15, 2021
DMCVault wrote:
TP_Erickson wrote:

I don't know if this falls into this category or if this is something else completely different, one of our departments is saying our servers we use for Commvault are using log4shell v1.2x. They need to update it to v2.16.0. Is this related to this topic? Does Commvault support this version of log4shell?

1.x is not affected by this vulnerability, our updates are specifically targeting the CVSS 10 vulnerability and therefore updates the affected 2.x versions.  We are however investigating upgrade paths for 1.x nonetheless … this will be addressed separately.  In cases like HyperScale 1.x log4j are still maintained and supported by RedHat.

Thank you, but the first part of the question i asked was overlooked.  is this log4shell a third party app which the server has installed prior to Commvault software, or is this something that Commvault installs, That's where the confusion comes into play for me, because it comes down to weather or not the department that brought this up is asking us for permissions to update it, or if this is something to do with commvault software which my team needs to handle?


Forum|alt.badge.img+8
  • Vaulter
  • 53 replies
  • December 15, 2021
TP_Erickson wrote:
DMCVault wrote:
TP_Erickson wrote:

I don't know if this falls into this category or if this is something else completely different, one of our departments is saying our servers we use for Commvault are using log4shell v1.2x. They need to update it to v2.16.0. Is this related to this topic? Does Commvault support this version of log4shell?

1.x is not affected by this vulnerability, our updates are specifically targeting the CVSS 10 vulnerability and therefore updates the affected 2.x versions.  We are however investigating upgrade paths for 1.x nonetheless … this will be addressed separately.  In cases like HyperScale 1.x log4j are still maintained and supported by RedHat.

Thank you, but the first part of the question i asked was overlooked.  is this log4shell a third party app which the server has installed prior to Commvault software, or is this something that Commvault installs, That's where the confusion comes into play for me, because it comes down to weather or not the department that brought this up is asking us for permissions to update it, or if this is something to do with commvault software which my team needs to handle?

Log4j is a java based open sourced logging utility.  It is used in millions of applications across the world.  It is possible another application is running on the system that could be using this.

But it is used throughout  the Commvault platform, specifically affected versions are bundled with SQL, Oracle, and Cloud App installations.  It is only active if you have DB archiving, masking, or table level restore enabled...so its a slim edge case, yet one you want to address.  You need to focus on applying the hotfixes to those apps.  Hope that helps.

 


Forum|alt.badge.img+6
  • Byte
  • 23 replies
  • December 15, 2021

thank you, 

DMCVault wrote:
TP_Erickson wrote:
DMCVault wrote:
TP_Erickson wrote:

I don't know if this falls into this category or if this is something else completely different, one of our departments is saying our servers we use for Commvault are using log4shell v1.2x. They need to update it to v2.16.0. Is this related to this topic? Does Commvault support this version of log4shell?

1.x is not affected by this vulnerability, our updates are specifically targeting the CVSS 10 vulnerability and therefore updates the affected 2.x versions.  We are however investigating upgrade paths for 1.x nonetheless … this will be addressed separately.  In cases like HyperScale 1.x log4j are still maintained and supported by RedHat.

Thank you, but the first part of the question i asked was overlooked.  is this log4shell a third party app which the server has installed prior to Commvault software, or is this something that Commvault installs, That's where the confusion comes into play for me, because it comes down to weather or not the department that brought this up is asking us for permissions to update it, or if this is something to do with commvault software which my team needs to handle?

Log4j is a java based open sourced logging utility.  It is used in millions of applications across the world.  It is possible another application is running on the system that could be using this.

But it is used throughout  the Commvault platform, specifically affected versions are bundled with SQL, Oracle, and Cloud App installations.  It is only active if you have DB archiving, masking, or table level restore enabled...so its a slim edge case, yet one you want to address.  You need to focus on applying the hotfixes to those apps.  Hope that helps.

 

thank you, with that said sounds like it is something the other department can update, sounds like Commvault can accommodate the update, thank you for the information. 


Mike Struening
Vaulter
Forum|alt.badge.img+23
doc d wrote:

All, it still does not seem clear having opened up these hotfixes why the installupdates and removeupdates are being updated in this … unless CV dev have put some kind of wrapper around something similar to the jndi class / lib inside these binaries ?

 

Noticed that no one answered your question directly!

Essentially, yes, you need to have some updates to the CS’s update distribution mechanism to push these patches.


Forum|alt.badge.img+12
  • Byte
  • 108 replies
  • December 15, 2021
Mike Struening wrote:
NVKVadivelu wrote:

My Commcell is 11.24.23 and last night i installed the hotfix 4550,4552,4553 when i do a search still see the older versions for LOG4J still in there, does any one know if Hotfix suppose to remove the old LOG4J version 

 

LOG4J older version Path still shows up are:

D:\Program Files\CommVault\Simpana\Apache\lib

D:\Program Files\CommVault\Simpana\CVCIEngine\CvPreviewHome\webapps\CvContentPreviewGenApp\WEB-INF\lib

D:\Program Files\CommVault\Simpana\MessageQueue\lib\optional

 

 

Hi @NVKVadivelu .  There are 1.x versions of Log4j that are there, and this update does not remove them (as they are not affected by this specific vulnerability).  However, there are other CVEs that we are investigating, including ways to replace 1.x versions with the latest.

Once we know more, we’ll update here.

 

What exactly does the released fix do, in the link below it is stated that it removes the affected versions. If there is a 1.x version, does it not do anything?

https://documentation.commvault.com/11.24/expert/146231_security_vulnerability_and_reporting.html

Also, I have 700 SQL Servers, is there a quick way to see which ones have table level restore enabled?

Best Regards.


Mike Struening
Vaulter
Forum|alt.badge.img+23

Hi @0ber0n !  The current hotfix replaces the 2.x affected versions with 2.15.

We do have an update in the works to replace with 2.16 (I’ll update here once ready).

To see what is enabled and vulnerable, we have a report coming out, but for now you’d have to check which is not really feasible.  You could update all 700 to be safe, or wait for the report (likely later this week).


Forum|alt.badge.img
  • 1 reply
  • December 16, 2021

Vulnerability page https://documentation.commvault.com/11.26/essential/146231_security_vulnerability_and_reporting.html  talks about only for CVE-2021-44228, however any update on new release vulnerability CVE-2021-45046? 


Graham Swift
Vaulter
Forum|alt.badge.img+11
Mike Struening wrote:

Hi @0ber0n !  The current hotfix replaces the 2.x affected versions with 2.15.

We do have an update in the works to replace with 2.16 (I’ll update here once ready).

To see what is enabled and vulnerable, we have a report coming out, but for now you’d have to check which is not really feasible.  You could update all 700 to be safe, or wait for the report (likely later this week).

 Hello @0ber0n and everyone else,

 

Just to confirm the report that will highlight the clients that are using the specific features affected can be found in cloud now for download and import in to your Webconsole report engine.

https://cloud.commvault.com/webconsole/downloadcenter/packageDetails.do?packageId=21789&status=0&type=details


Forum|alt.badge.img+11
  • Vaulter
  • 135 replies
  • December 16, 2021
Deepak G wrote:

Vulnerability page https://documentation.commvault.com/11.26/essential/146231_security_vulnerability_and_reporting.html  talks about only for CVE-2021-44228, however any update on new release vulnerability CVE-2021-45046? 

Hi @Deepak G

 

In the FAQ section of this thread, you can see CV is working towards addressing this new CVE. 

Once the new patches are out, this sticky thread will be updated as well.

 

Thank you 


Forum|alt.badge.img
d3nz wrote:

Thanks Mike,

Seems like there is no agents at server:

[root@commandcenter ~]# find / -name "apache"
/var/lib/selinux/targeted/active/modules/100/apache
/usr/share/selinux/targeted/default/active/modules/100/apache
/opt/commvault/Apache/work/Catalina/localhost/ROOT/org/apache
/opt/commvault/Apache/work/Catalina/localhost/adminconsole/org/apache
/opt/commvault/Apache/work/Catalina/localhost/console/org/apache
/opt/commvault/Apache/work/Catalina/localhost/webconsole/org/apache
/opt/commvault/Apache/work/Catalina/localhost/manager/org/apache
/opt/commvault/Apache/work/Catalina/localhost/global/org/apache
[root@commandcenter ~]# find / -name "Log4j"
[root@commandcenter ~]#

try:

find / -name log4j* 2>/dev/null

 


Forum|alt.badge.img+1

I received the Log4JAffectedServers.xml file from CV Support.  Does Anyone have instructions as to How to Run the Report to see what servers are Vulnerable in my Environment?  The XML report is Located here: https://cloud.commvault.com/webconsole/softwarestore/store.do#!/135/663/21789


Forum|alt.badge.img+15

Hi @Jeremy Fisher 

You will need to import the report xml into the Web Console and then you will see a list of affected clients and their update status.

https://cloud.commvault.com/webconsole/softwarestore/store.do#!/135/663/21789

Log4J affected servers

This report lists the servers that may potentially be impacted by Log4J vulnerability and the installation status of the corrective patches.

 

For info on how to do this, please see:

Downloading a Report from the Commvault Store

Downloading a Report from the Commvault Store on the Web Console

Importing Report Templates

Thanks,

Stuart


Reply


Cookie policy

We use cookies to enhance and personalize your experience. If you accept you agree to our full cookie policy. Learn more about our cookies.

 
Cookie settings