<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Does Splunk Enterprise, including Universal Fowarders make use of Log4j (cfr CVE-2021-44228)? in Splunk Enterprise</title>
    <link>https://community.splunk.com/t5/Splunk-Enterprise/Does-Splunk-Enterprise-including-Universal-Fowarders-make-use-of/m-p/578125#M10941</link>
    <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;and all,&lt;/P&gt;&lt;P&gt;The latest version (3.0.0) of the&amp;nbsp;&lt;A href="https://splunkbase.splunk.com/app/2911/" target="_self"&gt;Splunk add-on for Tomcat&lt;/A&gt; includes some Log4j libraries (version 2.4.1) in this directory:&lt;/P&gt;&lt;P&gt;.../bin/java/jmx-op-invoke-1.1.0/lib&lt;/P&gt;&lt;P&gt;At this moment, we are using (and have customized) a previous version of that add-on which is having the Log4j libraries in these directories:&lt;/P&gt;&lt;P&gt;.../bin/java/jmx-op-invoke-1.0/lib/&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;.../bin/java/log-discovery-1.0/lib/&lt;/P&gt;&lt;P&gt;As we both said, the fact that these libraries are present in the install path do not forcedly means we are exposed of course.&lt;/P&gt;&lt;P&gt;But we have seen many vendors (including Splunk) that have started to build and deliver patches, as a good practice, which will include newer Log4j libraries versions (2.15.0 or above) known to be unexposed to that CVE.&lt;/P&gt;&lt;P&gt;I presume this will also be the case in the coming hours/days for the Splunk add-on for Tomcat.&lt;/P&gt;&lt;P&gt;BR&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Sun, 12 Dec 2021 09:48:55 GMT</pubDate>
    <dc:creator>gdigrego</dc:creator>
    <dc:date>2021-12-12T09:48:55Z</dc:date>
    <item>
      <title>Does Splunk Enterprise, including Universal Fowarders make use of Log4j (cfr CVE-2021-44228)?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Does-Splunk-Enterprise-including-Universal-Fowarders-make-use-of/m-p/578111#M10936</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;This question is related to&amp;nbsp;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228" target="_blank" rel="noopener"&gt;CVE-2021-44228&lt;/A&gt;.&amp;nbsp;&lt;/P&gt;&lt;P&gt;As far as we could see/scan, Splunk binaries, including Universal Forwarders ones, do not rely on or use the Log4j library but we wanted to get some sort of "official confirmation" of this. Thanks if you can point any public document regarding this and regarding to Splunk potential exposure to this particular CVE.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best Regards.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 17:30:15 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Does-Splunk-Enterprise-including-Universal-Fowarders-make-use-of/m-p/578111#M10936</guid>
      <dc:creator>gdigrego</dc:creator>
      <dc:date>2021-12-11T17:30:15Z</dc:date>
    </item>
    <item>
      <title>Re: Does Splunk Enterprise, including Universal Fowarders make use of Log4j (cfr CVE-2021-44228)?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Does-Splunk-Enterprise-including-Universal-Fowarders-make-use-of/m-p/578114#M10937</link>
      <description>&lt;P&gt;AFAIK, Splunk is written in C and doesn't use log4j, but that could be old information.&lt;/P&gt;&lt;P&gt;Splunk is expected to make an announcement about the vulnerability later today.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 19:58:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Does-Splunk-Enterprise-including-Universal-Fowarders-make-use-of/m-p/578114#M10937</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-12-11T19:58:04Z</dc:date>
    </item>
    <item>
      <title>Re: Does Splunk Enterprise, including Universal Fowarders make use of Log4j (cfr CVE-2021-44228)?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Does-Splunk-Enterprise-including-Universal-Fowarders-make-use-of/m-p/578115#M10938</link>
      <description>&lt;P&gt;Doing some additional preliminary researches, it seems that some Splunk components (like "splunk_archiver") and some TAs like the &lt;A href="https://splunkbase.splunk.com/app/2911/" target="_self"&gt;Tomcat&lt;/A&gt; one include the Log4j library.&lt;/P&gt;&lt;P&gt;Does not mean forcedly that these libraries are exposed to attackers of course ...&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 11 Dec 2021 20:37:07 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Does-Splunk-Enterprise-including-Universal-Fowarders-make-use-of/m-p/578115#M10938</guid>
      <dc:creator>gdigrego</dc:creator>
      <dc:date>2021-12-11T20:37:07Z</dc:date>
    </item>
    <item>
      <title>Re: Does Splunk Enterprise, including Universal Fowarders make use of Log4j (cfr CVE-2021-44228)?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Does-Splunk-Enterprise-including-Universal-Fowarders-make-use-of/m-p/578119#M10939</link>
      <description>&lt;P&gt;Here's the official word:&amp;nbsp;&lt;A href="https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html" target="_blank"&gt;https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;In summary:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;&lt;SPAN&gt;Core Splunk Enterprise functionality does not use Log4j and is therefore not impacted. However, if Data Fabric Search (DFS) and Splunk Analytics for Hadoop (Hunk) product features are used, there is an impact because these product features leverage Log4j.&amp;nbsp;&lt;/SPAN&gt;&lt;I&gt;If these features are not used, there is no active attack vector related to CVE-2021-44228.&lt;/I&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;</description>
      <pubDate>Sun, 12 Dec 2021 00:52:11 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Does-Splunk-Enterprise-including-Universal-Fowarders-make-use-of/m-p/578119#M10939</guid>
      <dc:creator>richgalloway</dc:creator>
      <dc:date>2021-12-12T00:52:11Z</dc:date>
    </item>
    <item>
      <title>Re: Does Splunk Enterprise, including Universal Fowarders make use of Log4j (cfr CVE-2021-44228)?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Does-Splunk-Enterprise-including-Universal-Fowarders-make-use-of/m-p/578123#M10940</link>
      <description>&lt;P&gt;Are you sure that TA for Tomcat utilizes log4j? Whatever for? It's supposed to parse logs, not generate them.&lt;/P&gt;&lt;P&gt;Anyway, just because some solution uses the vulnerable component doesn't mean that it's used in a vulnerable way. If you use log4j but only ever log static messages or generate dynamic logs but never use any user-supplied data for it and you fully control the contents of your logs at all times you have nothing to worry about.&lt;/P&gt;&lt;P&gt;The vulnerability is so serious in global scale because of two factors:&lt;/P&gt;&lt;P&gt;1) ubiquity of log4j - it's the most common logging framework for java used across many many solutions written in java&lt;/P&gt;&lt;P&gt;2) many of those solutions are public-facing and they do log user-supplied data by design (like access-logs).&lt;/P&gt;&lt;P&gt;So even though splunk's dbconnect is written in java and probably (haven't checked it) uses log4j for logging, the possible attack vector would need data manipulation on the monitored database server side. If you were monitoring a completely unknown dbserver somewhere on the internet, the risk would be significant. If you're just monitoring your internal infrastructure the risk is much lower next to negligible depending on your organization.&lt;/P&gt;&lt;P&gt;With vulnerability management it's always about assessing risks.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Dec 2021 08:29:29 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Does-Splunk-Enterprise-including-Universal-Fowarders-make-use-of/m-p/578123#M10940</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2021-12-12T08:29:29Z</dc:date>
    </item>
    <item>
      <title>Re: Does Splunk Enterprise, including Universal Fowarders make use of Log4j (cfr CVE-2021-44228)?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Does-Splunk-Enterprise-including-Universal-Fowarders-make-use-of/m-p/578125#M10941</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://community.splunk.com/t5/user/viewprofilepage/user-id/231884"&gt;@PickleRick&lt;/a&gt;&amp;nbsp;and all,&lt;/P&gt;&lt;P&gt;The latest version (3.0.0) of the&amp;nbsp;&lt;A href="https://splunkbase.splunk.com/app/2911/" target="_self"&gt;Splunk add-on for Tomcat&lt;/A&gt; includes some Log4j libraries (version 2.4.1) in this directory:&lt;/P&gt;&lt;P&gt;.../bin/java/jmx-op-invoke-1.1.0/lib&lt;/P&gt;&lt;P&gt;At this moment, we are using (and have customized) a previous version of that add-on which is having the Log4j libraries in these directories:&lt;/P&gt;&lt;P&gt;.../bin/java/jmx-op-invoke-1.0/lib/&lt;/P&gt;&lt;P&gt;and&lt;/P&gt;&lt;P&gt;.../bin/java/log-discovery-1.0/lib/&lt;/P&gt;&lt;P&gt;As we both said, the fact that these libraries are present in the install path do not forcedly means we are exposed of course.&lt;/P&gt;&lt;P&gt;But we have seen many vendors (including Splunk) that have started to build and deliver patches, as a good practice, which will include newer Log4j libraries versions (2.15.0 or above) known to be unexposed to that CVE.&lt;/P&gt;&lt;P&gt;I presume this will also be the case in the coming hours/days for the Splunk add-on for Tomcat.&lt;/P&gt;&lt;P&gt;BR&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Dec 2021 09:48:55 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Does-Splunk-Enterprise-including-Universal-Fowarders-make-use-of/m-p/578125#M10941</guid>
      <dc:creator>gdigrego</dc:creator>
      <dc:date>2021-12-12T09:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: Does Splunk Enterprise, including Universal Fowarders make use of Log4j (cfr CVE-2021-44228)?</title>
      <link>https://community.splunk.com/t5/Splunk-Enterprise/Does-Splunk-Enterprise-including-Universal-Fowarders-make-use-of/m-p/578126#M10942</link>
      <description>&lt;P&gt;Ahhh. For jmx querying. That's equally unlikely exploitable as dbconnect.&lt;/P&gt;&lt;P&gt;But yes, I understand the rationale behind patching. Especially that vulnerability scanners usually don't understand the context and would simply flag as critical every single instance of log4j in vulnerable version they found. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 12 Dec 2021 10:07:04 GMT</pubDate>
      <guid>https://community.splunk.com/t5/Splunk-Enterprise/Does-Splunk-Enterprise-including-Universal-Fowarders-make-use-of/m-p/578126#M10942</guid>
      <dc:creator>PickleRick</dc:creator>
      <dc:date>2021-12-12T10:07:04Z</dc:date>
    </item>
  </channel>
</rss>

