Security

Patch for CVE-2021-4428

dhotlosz
Explorer

Does splunk have a patch for

CVE-2021-4428

Qualys has identified Apache Log4j Remote Code Execution (RCE) Vulnerability (Log4Shell) on the Splunk servers. Please update impacted Splunk infrastructure with any updates they provide.

0 Karma
1 Solution

venkatasri
SplunkTrust
SplunkTrust

Hi @dhotlosz 

You could track the status here and find relevant info for your products in use.

https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228...

---

An upvote would be appreciated if this reply helps!

View solution in original post

PickleRick
SplunkTrust
SplunkTrust

Please remember that though updating and patching your servers is a good practice on its own, this CVE depends on user-supplied input to be exploited. Therefore log4j included in splunk_archiver seems relatively unlikely to be abused this way. Which means that it's generally good to be on the safe side and have this vulnerability patched but this particular occurrence isn't that critical.

0 Karma

venkatasri
SplunkTrust
SplunkTrust

Hi @dhotlosz 

You could track the status here and find relevant info for your products in use.

https://www.splunk.com/en_us/blog/bulletins/splunk-security-advisory-for-apache-log4j-cve-2021-44228...

---

An upvote would be appreciated if this reply helps!

dhotlosz
Explorer

I removed the files but some keep coming back.

I see the advisory was updated with this

...

If any jar files return in the splunk_archiver app, disabling the default Bucket Copy Trigger search in that app will stop this behavior from happening.

....

How do I disable the bucket copy trigger search in the app?

Thanks

Dave

0 Karma

venkatasri
SplunkTrust
SplunkTrust

Hi @dhotlosz 

Go to if linux  - /opt/splunk/etc/apps/splunk_archiver/default

open savedsearches.conf, find [Bucket Copy Trigger] add disabled = 1.

---

An upvote would be appreciated if this reply helps!

0 Karma

venkatasri
SplunkTrust
SplunkTrust

May be create a local dir and add disabled = 1 instead of default.

If you are using deployer , deployment server and master push from there by setting disabled = 1 in local dir.

0 Karma

dhotlosz
Explorer

Thanks for the link I found it after I posted also but it does help

Tags (1)
0 Karma
Got questions? Get answers!

Join the Splunk Community Slack to learn, troubleshoot, and make connections with fellow Splunk practitioners in real time!

Meet up IRL or virtually!

Join Splunk User Groups to connect and learn in-person by region or remotely by topic or industry.

Get Updates on the Splunk Community!

Announcing Modern Navigation: A New Era of Splunk User Experience

We are excited to introduce the Modern Navigation feature in the Splunk Platform, available to both cloud and ...

Observability Simplified: Combining User Experience, Application Performance & ...

Tech Talk Observability Simplified: Combining User Experience, Application Performance & Network ...

Event Series May & June: From Network Visibility to Service Intelligence

Unifying the Network: Moving from Alert Noise to Service Intelligence with Splunk ITSI In today’s hybrid ...