Skip to main content

Log4j Vulnerability - Please Post All Questions Here


Show first post

344 replies

Forum|alt.badge.img+15

Hi @zahni 

You can register for Commvault Cloud access here:

https://cloud.commvault.com/commcellregistration/commcellregistration-form.jsp

This will enable to view lots of resources, including the Log4J fixes.

Thanks,

Stuart


Forum|alt.badge.img
  • Bit
  • 4 replies
  • December 17, 2021
Stuart Painter wrote:

Hi @zahni 

You can register for Commvault Cloud access here:

https://cloud.commvault.com/commcellregistration/commcellregistration-form.jsp

This will enable to view lots of resources, including the Log4J fixes.

Thanks,

Stuart

Sorry, as I told you: no cloud. I will run a fresh scan with Nessus ( https://www.tenable.com/ ) later this day, to verify if any Log4J 2.xx exist.


Forum|alt.badge.img+3
  • Byte
  • 9 replies
  • December 17, 2021

hello,

 

is there a easy manual way to determine if a machine has the vulnerability? The report that CV published in the store only shows two machines in my environment that need the hotfix. We have other machines that have sql and oracle and I want to be sure everything that needs the patch gets it. 

 

Thank you


Forum|alt.badge.img
  • Bit
  • 4 replies
  • December 17, 2021
Cbcurry1 wrote:

hello,

 

is there a easy manual way to determine if a machine has the vulnerability? The report that CV published in the store only shows two machines in my environment that need the hotfix. We have other machines that have sql and oracle and I want to be sure everything that needs the patch gets it. 

 

Thank you

OK, I found nothing:

( the 2 unkown jar are also from 1.x)

Nessus detected 15 installs of Apache Log4j:  Path    : D:\Commvault\ContentStore\Base\WebApp\shared\tomcat-extras\log4j-1.2.17.jar  Version : 1.2.17  Method  : JAR filesystem search  Path    : D:\Commvault\ContentStore\Base\vmheartbeatmon\zookeeper\lib\log4j-1.2.16.jar  Version : 1.2.16  Method  : JAR filesystem search  Path    : D:\Commvault\ContentStore\CVAnalytics\DataCube\app\webapps\server\WEB-INF\lib\log4j.jar  Version : unknown  Method  : JAR filesystem search  Path    : D:\Commvault\ContentStore\CustomReportsEngine\WEB-INF\lib\log4j-1.2.16.jar  Version : 1.2.16  Method  : JAR filesystem search  Path    : D:\Commvault\ContentStore\Base\WebApp\shared\apache-ant-1.9.4\lib\log4j-1.2.14.jar  Version : 1.2.14  Method  : JAR filesystem search  Path    : D:\Commvault\ContentStore\CVAnalytics\CVSeaHome\app\webapps\server\WEB-INF\lib\log4j-1.2.16.jar  Version : 1.2.16  Method  : JAR filesystem search  Path    : D:\Commvault\ContentStore\Base\DBMinerTool\log4j.jar  Version : unknown  Method  : JAR filesystem search  Path    : D:\Commvault\ContentStore\CVCIEngine\CvPreviewHome\app\webapps\server\WEB-INF\lib\log4j.jar  Version : unknown  Method  : JAR filesystem search  Path    : D:\Commvault\ContentStore\Base\WebApp\shared\apache-ant-1.8.4\lib\log4j-1.2.14.jar  Version : 1.2.14  Method  : JAR filesystem search  Path    : D:\Commvault\ContentStore\CVAnalytics\CVSeaHome\app\webapps\server\WEB-INF\lib\log4j-1.2.17.jar  Version : 1.2.17  Method  : JAR filesystem search  Path    : D:\Commvault\ContentStore\Apache\lib\log4j-1.2.16.jar  Version : 1.2.16  Method  : JAR filesystem search  Path    : D:\Commvault\ContentStore\CVCIEngine\CvPreviewHome\webapps\CvContentPreviewGenApp\WEB-INF\lib\log4j-1.2.17.jar  Version : 1.2.17  Method  : JAR filesystem search  Path    : D:\Commvault\ContentStore\Base\WebApp\shared\apache-ant-1.8.1\lib\log4j-1.2.14.jar  Version : 1.2.14  Method  : JAR filesystem search  Path    : D:\Commvault\ContentStore\MessageQueue\lib\optional\log4j-1.2.17.jar  Version : 1.2.17  Method  : JAR filesystem search  Path    : D:\Commvault\ContentStore\Base\WebApp\shared\log4j-1.2.15.jar  Version : 1.2.15  Method  : JAR filesystem search

Forum|alt.badge.img
  • Vaulter
  • 3 replies
  • December 17, 2021

I have applied the log4j-2.16 hotfixes to my Customer’s site on top of 11.24.25. The Log4j affected servers report shows that there is one client affected and also shows that the corrective fix is installed. However the Customer is reporting that their scans still show that vulnerable software is installed on the server --> /opt/commvault/Base32/DbJars/log4j-core-2.3.jar

  1. Are the hotfixes supposed to uninstall the older, vulnerable software?
  2. If not, can the Customer manually remove the file above themselves to clear the positive scan they are getting?

Thanks!

 


Mike Struening
Vaulter
Forum|alt.badge.img+23
Cbcurry1 wrote:

hello,

 

is there a easy manual way to determine if a machine has the vulnerability? The report that CV published in the store only shows two machines in my environment that need the hotfix. We have other machines that have sql and oracle and I want to be sure everything that needs the patch gets it. 

 

Thank you

@Cbcurry1 , then you only have 2 vulnerable.  Update those 2 and you should be good.


Mike Struening
Vaulter
Forum|alt.badge.img+23
Scott Hall wrote:

I have applied the log4j-2.16 hotfixes to my Customer’s site on top of 11.24.25. The Log4j affected servers report shows that there is one client affected and also shows that the corrective fix is installed. However the Customer is reporting that their scans still show that vulnerable software is installed on the server --> /opt/commvault/Base32/DbJars/log4j-core-2.3.jar

  1. Are the hotfixes supposed to uninstall the older, vulnerable software?
  2. If not, can the Customer manually remove the file above themselves to clear the positive scan they are getting?

Thanks!

 

@Scott Hall , the old versions will be in the uninstall folder, though an upcoming Maintenance Release will clear everything out.

It’s recommended to leave it (it’s not active) and let the upcoming MR remove it.


@Mike Struening and others: 

I’ve seen references in this discussion to whether SQL Server clients and Oracle clients have database archiving or data masking “enabled,” but I can’t find where those features are enabled (or disabled). While our site seems to be clean from a Log4J standpoint for now, we’d like to make sure our DBAs don’t somehow enable Log4J before we have the fixes pushed out everywhere. 

Can you clarify where those features are enabled or disabled, please? 

Nick Laflamme


Forum|alt.badge.img+3
  • Byte
  • 13 replies
  • December 17, 2021

1)can oracle dba run backups via commvault (command line backups)and use datamasking and datarchiving feautures.We are asking this because we ran log4j clients report and we didnot see any clients effected in cv consoles but dba claims they use datamasking and archiving features.These backups are oracle command line backups.

 

2)How do we differentiate the logical dump subclient from other subclients(any configuration selection) and how do we know if we enabled datamasking on any of the sql and oracle clients.We are looking for configuration settings from cv console which can show whether these features are enabled/disabled on clients from commvault


Mike Struening
Vaulter
Forum|alt.badge.img+23
Nick Laflamme II wrote:

@Mike Struening and others: 

I’ve seen references in this discussion to whether SQL Server clients and Oracle clients have database archiving or data masking “enabled,” but I can’t find where those features are enabled (or disabled). While our site seems to be clean from a Log4J standpoint for now, we’d like to make sure our DBAs don’t somehow enable Log4J before we have the fixes pushed out everywhere. 

Can you clarify where those features are enabled or disabled, please? 

Nick Laflamme

@Nick Laflamme II sharing a screenshot someone posted a few posts back:

 


Mike Struening
Vaulter
Forum|alt.badge.img+23
bhbekkam wrote:

1)can oracle dba run backups via commvault (command line backups)and use datamasking and datarchiving feautures.We are asking this because we ran log4j clients report and we didnot see any clients effected in cv consoles but dba claims they use datamasking and archiving features.These backups are oracle command line backups.

 

2)How do we differentiate the logical dump subclient from other subclients(any configuration selection) and how do we know if we enabled datamasking on any of the sql and oracle clients.We are looking for configuration settings from cv console which can show whether these features are enabled/disabled on clients from commvault

Hi ​​​​​ @bhbekkam  If RMAN is doing the backups and not using our binaries, then you won’t be vulnerable.

Regarding which clients are affected/vulnerable, the report will tell you.  The screenshot I just pasted above shows where the feature is enabled.


Forum|alt.badge.img+3
  • Byte
  • 13 replies
  • December 17, 2021

can rman go around using datamasking/archiving using our libobk.so file though the features are not enabled from commvault console

 

Also can you show me in commvault console where can we see if datamasking is enabled for a db?


Forum|alt.badge.img+2
  • Byte
  • 9 replies
  • December 17, 2021
Mike Struening wrote:
Scott Hall wrote:

I have applied the log4j-2.16 hotfixes to my Customer’s site on top of 11.24.25. The Log4j affected servers report shows that there is one client affected and also shows that the corrective fix is installed. However the Customer is reporting that their scans still show that vulnerable software is installed on the server --> /opt/commvault/Base32/DbJars/log4j-core-2.3.jar

  1. Are the hotfixes supposed to uninstall the older, vulnerable software?
  2. If not, can the Customer manually remove the file above themselves to clear the positive scan they are getting?

Thanks!

 

@Scott Hall , the old versions will be in the uninstall folder, though an upcoming Maintenance Release will clear everything out.

It’s recommended to leave it (it’s not active) and let the upcoming MR remove it.

 

The issue with this is that CISA is requiring that all versions of Log4j prior to 2.15 are removed by Friday, 12/24. If you are company who does business with the Feds this is a big issue for you. Please provide guidance. 


Forum|alt.badge.img+11
  • Vaulter
  • 135 replies
  • December 17, 2021
bhbekkam wrote:

can rman go around using datamasking/archiving using our libobk.so file though the features are not enabled from commvault console

 

Also can you show me in commvault console where can we see if datamasking is enabled for a db?

hi @bhbekkam 

 

Not sure about what you are asking for the first question, but if you use the Log4j Affected Servers report, it will tell you which clients have these features enabled. 

 

https://cloud.commvault.com/webconsole/softwarestore/store.do#!/135/663/21789

 

Please see top sticky post for all updated information:
 

 


Forum|alt.badge.img+11
  • Vaulter
  • 135 replies
  • December 17, 2021

hi @MathBob 

 

Completely understand the predicament here. Commvault is targeting the rollup Maintenance Release to be available before December 24th. Once the rollup MR is installed, all temporary old binaries will also be completely removed.

 

Please track the top sticky post for updates
 

Thank you


Mike Struening
Vaulter
Forum|alt.badge.img+23

The original post has now been updated with the process Remediating affected CDS file system for HyperScale X (HSX) Nodes.

Note: These instructions only apply to Hyperscale X /CDS/Hedvig.

Hyperscale 1.5 uses the 1.x versions of log4j bundled which are maintained and supported by Redhat.  These versions are not affected by this CVE.


Forum|alt.badge.img

Hello there,

We have updated to latest MR with the recommended hotfix and patches recommended for log4j however some client servers still detected as vulnerability in internal VA scan and show the Log4j 2.15 binary though already updated as per Commvault recommendation. Please see the below screenshot for hotfixes installed in one of client servers which is still coming up in vulnerability scan.. please advise further

 

 


Forum|alt.badge.img+8
  • Vaulter
  • 53 replies
  • December 18, 2021
Krishan Bhatt wrote:

Hello there,

We have updated to latest MR with the recommended hotfix and patches recommended for log4j however some client servers still detected as vulnerability in internal VA scan and show the Log4j 2.15 binary though already updated as per Commvault recommendation. Please see the below screenshot for hotfixes installed in one of client servers which is still coming up in vulnerability scan.. please advise further

 

 

When you install the updates, the old 2.15 binaries are copied to a cache (updates folder) for rollback purposes.  This is how installupdates works with Commvault - just incase something goes wrong during a hotfix install.  They are not in use.  In the upcoming Maintenance packs, we will be cleaning these up soe they arent picked up on scans.


Forum|alt.badge.img+1
  • Bit
  • 4 replies
  • December 19, 2021

We have installed the latest patch.

But if we scan the Oracle systems, we got always an vulnerability information.

 

# ./log4j2-scan /opt
Logpresso CVE-2021-44228 Vulnerability Scanner 2.3.1 (2021-12-19)
Scanning directory: /opt (without devtmpfs, tmpfs, 192.168.101.250:/vol_trace_archive, FSFS01O1-101:/ora_mesPDB_oraarch, FSFS01O1-101:/ora_mesPDB_crs3, FSFS01O1-101:/ora_mesPDB_redo1, FSFS01O1-101:/ora_mesPDB_crs2, 192.168.101.90:/pdb_quafos, FSFS01O1-101:/ora_mesPDB_oradata, FSFS01O1-101:/ora_mesPDB_crs1, FSFS01O1-101:/ora_mesPDB_redo2, 192.168.101.90:/sap2mds_data, fsfs0003:/vol/ora_backup)

  • Found CVE-2021-44228 (log4j 2.x) vulnerability in /opt/omni/bin/telemetry/log4j-core-2.6.2.jar, log4j 2.6.2 (mitigated)
  • Found CVE-2021-45046 (log4j 2.x) vulnerability in /opt/oracle.ahf/common/jlib/tfa.war (WEB-INF/lib/log4j-core-2.15.0.jar), log4j 2.15.0 (mitigated)
  • Found CVE-2021-45046 (log4j 2.x) vulnerability in /opt/oracle.ahf/common/jlib/log4j-core-2.15.0.jar, log4j 2.15.0 (mitigated)
    [?] Found CVE-2021-44228 (log4j 2.x) vulnerability in /opt/commvault/Updates/linux-x8664_11.0.0B80-SP24_SP24-HotFix-4564/Base64/DbJars/DbArchiveEngine.jar, log4j N/A - potentially vulnerable
    [?] Found CVE-2021-44228 (log4j 2.x) vulnerability in /opt/commvault/Base64/DbJars/DbArchiveEngine.jar, log4j N/A - potentially vulnerable

    Scanned 5279 directories and 45651 files
    Found 0 vulnerable files
    Found 2 potentially vulnerable files
    Found 3 mitigated files
    Completed in 6.89 seconds

     

    The both required Hotfixes 4551 and 4564 are installed.

     

    Is the issue exist furthermore and it is planned to provide a new patch?

     


  • Forum|alt.badge.img
    • Byte
    • 3 replies
    • December 19, 2021

    What about .17 that was released earlier today to address another issue that was found?

    As a fed msp, we are getting requests for information and updates on following apache recommendations as systems are being scanned even with the .16 update in place.

    The likelihood of being able to obtain waivers for CV is low as everyone has visibility on this (way outside the normal chain of command).


    Forum|alt.badge.img+11
    • Vaulter
    • 135 replies
    • December 19, 2021
    chrisp wrote:

    What about .17 that was released earlier today to address another issue that was found?

    As a fed msp, we are getting requests for information and updates on following apache recommendations as systems are being scanned even with the .16 update in place.

    The likelihood of being able to obtain waivers for CV is low as everyone has visibility on this (way outside the normal chain of command).

    Hi @chrisp 

     

    Commvault engineering team has determined that Log4j 2.17’s vulnerability is only when a specific feature of Log4j is used and this feature can be confirmed to NOT be in use across Commvault’s code base. 

     

    This means Commvault cannot be vulnerable to 2.16’s vulnerability and it is secure to stay on 2.16 for Commvault products. 

     

    Thank you


    Damian Andre
    Vaulter
    Forum|alt.badge.img+23
    • Vaulter
    • 1287 replies
    • December 19, 2021
    Nishika wrote:

    We have installed the latest patch.

    But if we scan the Oracle systems, we got always an vulnerability information.

     

    Scanned 5279 directories and 45651 files
    Found 0 vulnerable files
    Found 2 potentially vulnerable files
    Found 3 mitigated files
    Completed in 6.89 seconds

     

    The both required Hotfixes 4551 and 4564 are installed.

     

    Hey @Nishika,

    Mitigated means the binary is unaffected from the vulnerability (i.e it has been patched) - so no action needed. The reason why your scanner is detecting potentially vulnerable files is because it cannot identify the version, however with the hotfixes installed those files are safe, so no further action needs to be taken. You can double check using the report in the top of this post as well.


    Forum|alt.badge.img+8
    • Commvault Certified Expert
    • 74 replies
    • December 20, 2021

    Hi All, sorry for beating a dead horse, but Log4J v1.

    I’ve seen a few entries above stating that v1 is not vulnerable, or a bit cryptically “These versions are not affected by this CVE.”

    Since Nessus and Microsoft Threat Intelligence are reporting that ..\Base\vmheartbeatmon\zookeeper\lib\log4j-1.2.16.jar is vulnerable, is there a non-Commvault site that confirms we do not have to patch that? Customers are a bit wary at the moment and quite paranoid.

    Many thanks, and keep up the hard work during this difficult time.


    Forum|alt.badge.img+15
    • Byte
    • 386 replies
    • December 20, 2021

    Hi !

    I just saw that a new FR has been released, and from now it looks like it’s embedding the log4j hotfixes.

    But, I do not find a clear statement about this.

    See below 

    https://documentation.commvault.com/v11/essential/146231_security_vulnerability_and_reporting.html

    Updated On: December 19, 2021

    When following the link for my FR24, I’m redirected to the Store.

    I tried to access the ‘read more’ but unfortunately :

     

    So I went to my MA and checked the release notes 

    https://documentation.commvault.com/11.24/assets/service_pack/updates/11_24_29.htm

    But no mention of the log4j and 4551 / 4552 / 4564 hotfixes.  

    Can a Vaulter confirm my understanding / reading of this ?

    The dec19 FR24HP29 does NOT (yet) include the log4j hotfixes, and they should be released in the next HP?


    Forum|alt.badge.img

    Hi all!

    We are having similar problems like previous message.

    We are in SP16 and we have doubts about the latest Hot Fix Pack 136.

    “Learn more” link is broken:

    In changelog we can’t see info about two latest HPK:

    So, is the Log4j v2.16 fix included in HPK 136 or not?.

    Thanks, regards.


    Reply


    Cookie policy

    We use cookies to enhance and personalize your experience. If you accept you agree to our full cookie policy. Learn more about our cookies.

     
    Cookie settings