<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Log4j - vulnerabilities - version 2.17.1 and before in Splunk AppDynamics</title>
    <link>https://community.splunk.com/t5/Splunk-AppDynamics/Log4j-vulnerabilities-version-2-17-1-and-before/m-p/723117#M3537</link>
    <description>&lt;P&gt;Community,&lt;/P&gt;&lt;P&gt;If have been out on a deserted island, there were a few NIST vulnerabilities reported that has impacted AppDynamics controllers (saas and on-prem) and a number of Java based agents.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The main reason why I am authoring this thread for the community is to hopefully offer my perspective but also humbly request that if I got something wrong or missed something, you take the five minutes to call it out and help myself/others understand better the nature of this beast.&lt;/P&gt;&lt;P&gt;Vulnerabilities seem to be falling into three buckets.&lt;/P&gt;&lt;P&gt;1. Directly - Has the Apache log4j jars (core) with a version that is impacted&lt;/P&gt;&lt;P&gt;2. Indirectly - A library jar has the log4j jars within it (nested jars)&lt;/P&gt;&lt;P&gt;3. Diverged - At some point the log4j source was branched and modified to a custom version&lt;/P&gt;&lt;P&gt;1. Case - machine agent within the &amp;lt;agent home&amp;gt;/lib/log4j-core-2.x.jar&lt;/P&gt;&lt;P&gt;2. Don't have a good example of this for AppDynamics&lt;/P&gt;&lt;P&gt;3. Case - machine agent within the &amp;lt;agent-home&amp;gt;/lib/singularity-log4j-1.2.15.6.jar within the&amp;nbsp;&lt;/P&gt;&lt;P&gt;singularity-log4j-1.2.15.6.jar\com\singularity\util\org\apache\log4j\.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Within the third example there is a NOTICE file in the META-INF folder that has "Copyright 2017. AppDynamics modified from Log4j2.&amp;nbsp; So the Log4J was after the end of life of 1.2.x and without a different detection method, we are unsure if the vulnerabilities that plague us are within this variant (yes, Loki reference)&lt;/P&gt;&lt;P&gt;Now we can get into the detection methods.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;By File Name&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;For case 1, it is a simple directory listing and search for log4j*.&amp;nbsp; Case 2 gets a bit messy since each of the JAR files have to be listed to search for Log4j.&amp;nbsp; &amp;nbsp;The third case, is much like case 2, but we get into a mess since as exampled above the file name is mauled up with "singularity".&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;By JVM Class presence&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;For each of the three cases, this method requires another Java class is injected into the JVM that can then attempt to access the log4j vulnerability, be that to execute a JNDI lookup or to capture and de-seralize a message packet.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;By Directed Attack&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Some of the vulnerabilities have exploits in the wild and those exploits have already been deployed against a number of targets with very destructive results.&lt;/P&gt;&lt;P&gt;Now the majority of the vulnerabilities scan vendors are continuing to fine tune their scan patterns but to be 100% sure, IMHO, there really needs to have a Java class injection that pulls the in memory Log4J class references and probes them, especially with the diverged variants.&lt;/P&gt;&lt;P&gt;------- Laundry list of vulnerabilities --------------&lt;/P&gt;&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228" target="_blank" rel="noopener nofollow noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2021-44228&lt;/A&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0 Critical&lt;/P&gt;&lt;P&gt;Impacts log4J 2.x&lt;/P&gt;&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046" target="_blank" rel="noopener nofollow noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2021-45046&lt;/A&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;9.0 Critical&amp;nbsp;&lt;/P&gt;&lt;P&gt;Impacts log4j 2.16.x&lt;/P&gt;&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-45105" target="_blank" rel="noopener nofollow noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2021-45105&lt;/A&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;5.8 Medium&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Impacts log4j 2.17.x&lt;/P&gt;&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" target="_blank" rel="noopener nofollow noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2021-4104&lt;/A&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 7.5 HIGH&lt;/P&gt;&lt;P&gt;Impacts log4j 1.2.x - basically 1.2 end of life in 2015 but there was another vulnerability found.&amp;nbsp; "&lt;SPAN&gt;deserialization of untrusted data when the attacker has write access to the Log4j configuration"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Billy Cole&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 11 Jan 2022 18:58:27 GMT</pubDate>
    <dc:creator>Billy_Cole1</dc:creator>
    <dc:date>2022-01-11T18:58:27Z</dc:date>
    <item>
      <title>Log4j - vulnerabilities - version 2.17.1 and before</title>
      <link>https://community.splunk.com/t5/Splunk-AppDynamics/Log4j-vulnerabilities-version-2-17-1-and-before/m-p/723117#M3537</link>
      <description>&lt;P&gt;Community,&lt;/P&gt;&lt;P&gt;If have been out on a deserted island, there were a few NIST vulnerabilities reported that has impacted AppDynamics controllers (saas and on-prem) and a number of Java based agents.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The main reason why I am authoring this thread for the community is to hopefully offer my perspective but also humbly request that if I got something wrong or missed something, you take the five minutes to call it out and help myself/others understand better the nature of this beast.&lt;/P&gt;&lt;P&gt;Vulnerabilities seem to be falling into three buckets.&lt;/P&gt;&lt;P&gt;1. Directly - Has the Apache log4j jars (core) with a version that is impacted&lt;/P&gt;&lt;P&gt;2. Indirectly - A library jar has the log4j jars within it (nested jars)&lt;/P&gt;&lt;P&gt;3. Diverged - At some point the log4j source was branched and modified to a custom version&lt;/P&gt;&lt;P&gt;1. Case - machine agent within the &amp;lt;agent home&amp;gt;/lib/log4j-core-2.x.jar&lt;/P&gt;&lt;P&gt;2. Don't have a good example of this for AppDynamics&lt;/P&gt;&lt;P&gt;3. Case - machine agent within the &amp;lt;agent-home&amp;gt;/lib/singularity-log4j-1.2.15.6.jar within the&amp;nbsp;&lt;/P&gt;&lt;P&gt;singularity-log4j-1.2.15.6.jar\com\singularity\util\org\apache\log4j\.&lt;/P&gt;&lt;P&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Within the third example there is a NOTICE file in the META-INF folder that has "Copyright 2017. AppDynamics modified from Log4j2.&amp;nbsp; So the Log4J was after the end of life of 1.2.x and without a different detection method, we are unsure if the vulnerabilities that plague us are within this variant (yes, Loki reference)&lt;/P&gt;&lt;P&gt;Now we can get into the detection methods.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;By File Name&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;For case 1, it is a simple directory listing and search for log4j*.&amp;nbsp; Case 2 gets a bit messy since each of the JAR files have to be listed to search for Log4j.&amp;nbsp; &amp;nbsp;The third case, is much like case 2, but we get into a mess since as exampled above the file name is mauled up with "singularity".&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;By JVM Class presence&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;For each of the three cases, this method requires another Java class is injected into the JVM that can then attempt to access the log4j vulnerability, be that to execute a JNDI lookup or to capture and de-seralize a message packet.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;By Directed Attack&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Some of the vulnerabilities have exploits in the wild and those exploits have already been deployed against a number of targets with very destructive results.&lt;/P&gt;&lt;P&gt;Now the majority of the vulnerabilities scan vendors are continuing to fine tune their scan patterns but to be 100% sure, IMHO, there really needs to have a Java class injection that pulls the in memory Log4J class references and probes them, especially with the diverged variants.&lt;/P&gt;&lt;P&gt;------- Laundry list of vulnerabilities --------------&lt;/P&gt;&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228" target="_blank" rel="noopener nofollow noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2021-44228&lt;/A&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;10.0 Critical&lt;/P&gt;&lt;P&gt;Impacts log4J 2.x&lt;/P&gt;&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046" target="_blank" rel="noopener nofollow noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2021-45046&lt;/A&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;9.0 Critical&amp;nbsp;&lt;/P&gt;&lt;P&gt;Impacts log4j 2.16.x&lt;/P&gt;&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-45105" target="_blank" rel="noopener nofollow noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2021-45105&lt;/A&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;5.8 Medium&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Impacts log4j 2.17.x&lt;/P&gt;&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" target="_blank" rel="noopener nofollow noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2021-4104&lt;/A&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 7.5 HIGH&lt;/P&gt;&lt;P&gt;Impacts log4j 1.2.x - basically 1.2 end of life in 2015 but there was another vulnerability found.&amp;nbsp; "&lt;SPAN&gt;deserialization of untrusted data when the attacker has write access to the Log4j configuration"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thank you,&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Billy Cole&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 11 Jan 2022 18:58:27 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-AppDynamics/Log4j-vulnerabilities-version-2-17-1-and-before/m-p/723117#M3537</guid>
      <dc:creator>Billy_Cole1</dc:creator>
      <dc:date>2022-01-11T18:58:27Z</dc:date>
    </item>
    <item>
      <title>Re: Log4j - vulnerabilities - version 2.17.1 and before</title>
      <link>https://community.splunk.com/t5/Splunk-AppDynamics/Log4j-vulnerabilities-version-2-17-1-and-before/m-p/723118#M3538</link>
      <description>&lt;P&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-4104" target="_blank" rel="noopener nofollow noreferrer"&gt;https://nvd.nist.gov/vuln/detail/CVE-2021-4104&lt;/A&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 7.5 HIGH&lt;/P&gt;&lt;P&gt;Impacts log4j 1.2.x - basically 1.2 end of life in 2015 but there was another vulnerability found.&amp;nbsp; "&lt;SPAN&gt;deserialization of untrusted data when the attacker has write access to the Log4j configuration"&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;This Log4J instance is within the singularity&amp;nbsp;jars, and that version of Log4j was code branched in 2017 and does not include the JMSAppender which is the affected class for this vulnerability.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;“&lt;EM&gt;Machine Agent is &lt;STRONG&gt;NOT&lt;/STRONG&gt; vulnerable to this CVE because the singularity0log4j doesn’t bundle JMSAppender.”&lt;/EM&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 13:24:57 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-AppDynamics/Log4j-vulnerabilities-version-2-17-1-and-before/m-p/723118#M3538</guid>
      <dc:creator>Billy_Cole1</dc:creator>
      <dc:date>2022-01-12T13:24:57Z</dc:date>
    </item>
    <item>
      <title>Re: Log4j - vulnerabilities - version 2.17.1 and before</title>
      <link>https://community.splunk.com/t5/Splunk-AppDynamics/Log4j-vulnerabilities-version-2-17-1-and-before/m-p/723119#M3539</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;A href="https://community.appdynamics.com/t5/user/viewprofilepage/user-id/152794"&gt;@Billy.Cole&lt;/A&gt;,&lt;/P&gt;

&lt;P&gt;Thanks for sharing all this wonderful info on the Community!&lt;/P&gt;
&lt;P&gt;We'd like to note and share some additional resources for yourself or anyone else who comes across this post.&lt;/P&gt;
&lt;DIV class="p-rich_text_section"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;OL class="p-rich_text_list p-rich_text_list__ordered" data-stringify-type="ordered-list" data-indent="0" data-border="0"&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;Link to the&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A class="c-link" tabindex="-1" href="https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+Apache+Log4j+Vulnerability" target="_blank" rel="noopener noreferrer nofollow" data-stringify-link="https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+Apache+Log4j+Vulnerability" data-sk="tooltip_parent" data-remove-tab-index="true"&gt;Security Advisory: Apache Log4j Vulnerability&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;&lt;A class="c-link" tabindex="-1" href="https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+CVE-2021-45105+in+Apache+Log4j" target="_blank" rel="noopener noreferrer nofollow" data-stringify-link="https://docs.appdynamics.com/display/PAA/Security+Advisory%3A+CVE-2021-45105+in+Apache+Log4j" data-sk="tooltip_parent" data-remove-tab-index="true"&gt;Security Advisory: CVE-2021-45105 in Apache Log4j&lt;/A&gt;&lt;/LI&gt;
&lt;LI data-stringify-indent="0" data-stringify-border="0"&gt;Community News &amp;amp; Announcements &lt;A href="https://community.appdynamics.com/t5/News-Announcements/bg-p/news-and-announcements/label-name/privacy%20and%20security" target="_self"&gt;Privacy and Security label&lt;/A&gt;&amp;nbsp;(which has current info about Log4j)&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;Feel free to comment on any of those existing pieces of content as well.&amp;nbsp;&lt;/P&gt;

&lt;P&gt;Thanks again for sharing!&lt;/P&gt;</description>
      <pubDate>Wed, 12 Jan 2022 19:14:37 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-AppDynamics/Log4j-vulnerabilities-version-2-17-1-and-before/m-p/723119#M3539</guid>
      <dc:creator>iamryan</dc:creator>
      <dc:date>2022-01-12T19:14:37Z</dc:date>
    </item>
  </channel>
</rss>

