Skip to main content

CVE-2021-44228 Remote code execution vulnerability in Apache Log4j

In this article, we examine the CVE-2021-44228 remote code, an execution vulnerability in Apache Log4j.

Y
Written by Yusef Abulaynain
Updated over 4 months ago

For hosted customer please raise a new case online and reference the title of this article.

For non-hosted

Summary

A critical vulnerability has been identified in a third-party component (Apache Log4j), which is currently used within Mosaic. The vulnerability is identified as CVE-2021-44228 - remote code execution vulnerability in Apache Log4j.

If youโ€™re running an older release of Mosaic, such as 5.15 or 5.16, you donโ€™t need to take any action as the affected class-file is not used in these versions of the third-party library.

The log4j library version has been uplifted to 2.17.0 in Mosaic 22.1.0.0 and therefore the workaround is not required from Mosaic version 22.1.0.0 or later.

The log4j 1.2.x jar is still shipped with Mosaic in this version but the log file entries will now come from log4j 2, the library will be completely removed in a future release.

Workaround

Add the following WebLogic server start argument to all Mosaic managed servers.

  1. In Weblogic go to Environment, then go to Servers.

  2. Select the relevant server.

  3. Click the Server Start tab.

  4. Update the contents of the arguments field by adding the following:

-Dlog4j2.formatMsgNoLookups=true

๐Ÿ“Œ Note: The Weblogic managed server, not the VM, will require a restart before the change takes effect.

Did this answer your question?