Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Bookmarks
  • Search
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Brand Logo

Cloudron Forum

Apps | Demo | Docs | Install
  1. Cloudron Forum
  2. Support
  3. Log4j and log4j2 library vulnerability

Log4j and log4j2 library vulnerability

Scheduled Pinned Locked Moved Solved Support
security
31 Posts 10 Posters 9.9k Views 11 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • rmdesR rmdes

    Docker Scan should allow us to scan cloudron containers if any doubt remains :
    https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/

    edit : https://github.com/docker/scan-cli-plugin/releases/tag/v0.11.0

    rmdesR Offline
    rmdesR Offline
    rmdes
    wrote on last edited by
    #14

    This tool is also neat, with or without cloudron context : https://github.com/fullhunt/log4j-scan

    1 Reply Last reply
    3
    • girishG Do not disturb
      girishG Do not disturb
      girish
      Staff
      wrote on last edited by
      #15

      "Log4j 2.15.0 and previously suggested mitigations may not be enough" - https://isc.sans.edu/diary/Log4j+2.15.0+and+previously+suggested+mitigations+may+not+be+enough/28134

      necrevistonnezrN 1 Reply Last reply
      1
      • girishG girish

        "Log4j 2.15.0 and previously suggested mitigations may not be enough" - https://isc.sans.edu/diary/Log4j+2.15.0+and+previously+suggested+mitigations+may+not+be+enough/28134

        necrevistonnezrN Offline
        necrevistonnezrN Offline
        necrevistonnezr
        wrote on last edited by
        #16

        @girish I ran https://github.com/mergebase/log4j-detector today and it seems that at least SOLR is vulnerable(?)

        /proc/5961/task/9300/cwd/lib/ext/log4j-core-2.14.1.jar contains Log4J-2.x   >= 2.10.0 _VULNERABLE_ :-(
        /var/lib/docker/overlay2/32ab0d12f3342918d0ffea4a1392cb760f852f9bf0a219c682dd366ff26e72bc/diff/usr/share/java/log4j-1.2-1.2.17.jar contains Log4J-1.x   <= 1.2.17 _OLD_ :-|
        /var/lib/docker/overlay2/5bb4ce30d32c6760fe21e98ab6f98651bf9591e83ab2385f0a4833ee5ef0c979/diff/app/code/solr/contrib/prometheus-exporter/lib/log4j-core-2.14.1.jar contains Log4J-2.x   >= 2.10.0 _VULNERABLE_ :-(
        /var/lib/docker/overlay2/5bb4ce30d32c6760fe21e98ab6f98651bf9591e83ab2385f0a4833ee5ef0c979/diff/app/code/solr/server/lib/ext/log4j-core-2.14.1.jar contains Log4J-2.x   >= 2.10.0 _VULNERABLE_ :-(
        /var/lib/docker/overlay2/f8ed382cc2590afd6189335f84aaf0f561811a5165dbf58191be61048c5312f5/merged/app/code/solr/contrib/prometheus-exporter/lib/log4j-core-2.14.1.jar contains Log4J-2.x   >= 2.10.0 _VULNERABLE_ :-(
        /var/lib/docker/overlay2/f8ed382cc2590afd6189335f84aaf0f561811a5165dbf58191be61048c5312f5/merged/app/code/solr/server/lib/ext/log4j-core-2.14.1.jar contains Log4J-2.x   >= 2.10.0 _VULNERABLE_ :-(
        
        BrutalBirdieB 1 Reply Last reply
        2
        • necrevistonnezrN necrevistonnezr

          @girish I ran https://github.com/mergebase/log4j-detector today and it seems that at least SOLR is vulnerable(?)

          /proc/5961/task/9300/cwd/lib/ext/log4j-core-2.14.1.jar contains Log4J-2.x   >= 2.10.0 _VULNERABLE_ :-(
          /var/lib/docker/overlay2/32ab0d12f3342918d0ffea4a1392cb760f852f9bf0a219c682dd366ff26e72bc/diff/usr/share/java/log4j-1.2-1.2.17.jar contains Log4J-1.x   <= 1.2.17 _OLD_ :-|
          /var/lib/docker/overlay2/5bb4ce30d32c6760fe21e98ab6f98651bf9591e83ab2385f0a4833ee5ef0c979/diff/app/code/solr/contrib/prometheus-exporter/lib/log4j-core-2.14.1.jar contains Log4J-2.x   >= 2.10.0 _VULNERABLE_ :-(
          /var/lib/docker/overlay2/5bb4ce30d32c6760fe21e98ab6f98651bf9591e83ab2385f0a4833ee5ef0c979/diff/app/code/solr/server/lib/ext/log4j-core-2.14.1.jar contains Log4J-2.x   >= 2.10.0 _VULNERABLE_ :-(
          /var/lib/docker/overlay2/f8ed382cc2590afd6189335f84aaf0f561811a5165dbf58191be61048c5312f5/merged/app/code/solr/contrib/prometheus-exporter/lib/log4j-core-2.14.1.jar contains Log4J-2.x   >= 2.10.0 _VULNERABLE_ :-(
          /var/lib/docker/overlay2/f8ed382cc2590afd6189335f84aaf0f561811a5165dbf58191be61048c5312f5/merged/app/code/solr/server/lib/ext/log4j-core-2.14.1.jar contains Log4J-2.x   >= 2.10.0 _VULNERABLE_ :-(
          
          BrutalBirdieB Offline
          BrutalBirdieB Offline
          BrutalBirdie
          Partner
          wrote on last edited by
          #17

          @nebulon ping
          Can you check that out?

          Like my work? Consider donating a drink. Cheers!

          nebulonN 1 Reply Last reply
          1
          • BrutalBirdieB BrutalBirdie

            @nebulon ping
            Can you check that out?

            nebulonN Offline
            nebulonN Offline
            nebulon
            Staff
            wrote on last edited by
            #18

            @brutalbirdie just because the library is used, does not mean the app is actually vulnerable. In either case all we can really do from our side is to closely track upstream releases during such times and release new app packages asap. We usually can't really patch the upstream apps easily. In this case it seem to be prometheus related? @necrevistonnezr do you know to which app those layers in your case are related to?

            necrevistonnezrN 1 Reply Last reply
            2
            • nebulonN nebulon

              @brutalbirdie just because the library is used, does not mean the app is actually vulnerable. In either case all we can really do from our side is to closely track upstream releases during such times and release new app packages asap. We usually can't really patch the upstream apps easily. In this case it seem to be prometheus related? @necrevistonnezr do you know to which app those layers in your case are related to?

              necrevistonnezrN Offline
              necrevistonnezrN Offline
              necrevistonnezr
              wrote on last edited by
              #19

              @nebulon The only SOLR instance is the Cloudron internal mail indexing, in my case.

              nebulonN 1 Reply Last reply
              0
              • necrevistonnezrN necrevistonnezr

                @nebulon The only SOLR instance is the Cloudron internal mail indexing, in my case.

                nebulonN Offline
                nebulonN Offline
                nebulon
                Staff
                wrote on last edited by
                #20

                @necrevistonnezr ah ok, then this is fine. It is not exposed or anything.

                3 1 Reply Last reply
                0
                • girishG Do not disturb
                  girishG Do not disturb
                  girish
                  Staff
                  wrote on last edited by
                  #21

                  I am aware of solr being detected by the static analyzers (the marketplace images complain about the same). solr is used internally for full text search in the mail container. It's not on by default and it's also not exposed outside the internal docker network (so not exposed to outside world).

                  Still, we will update the mail container. Solr only put out a new release yesterday which update log4j.

                  M 1 Reply Last reply
                  3
                  • girishG girish

                    I am aware of solr being detected by the static analyzers (the marketplace images complain about the same). solr is used internally for full text search in the mail container. It's not on by default and it's also not exposed outside the internal docker network (so not exposed to outside world).

                    Still, we will update the mail container. Solr only put out a new release yesterday which update log4j.

                    M Offline
                    M Offline
                    Mastadamus
                    wrote on last edited by
                    #22

                    @girish min patch to rectify log4j2 issues is 2.16 .. 2.15 is affected by cvss 9.0 rce in some instances.

                    1 Reply Last reply
                    4
                    • rmdesR rmdes

                      Docker Scan should allow us to scan cloudron containers if any doubt remains :
                      https://www.docker.com/blog/apache-log4j-2-cve-2021-44228/

                      edit : https://github.com/docker/scan-cli-plugin/releases/tag/v0.11.0

                      M Offline
                      M Offline
                      Mastadamus
                      wrote on last edited by
                      #23

                      @rmdes good suggestion.

                      M 1 Reply Last reply
                      0
                      • M Mastadamus

                        @rmdes good suggestion.

                        M Offline
                        M Offline
                        Mastadamus
                        wrote on last edited by
                        #24

                        @mastadamus I'm happy to report that Crowdsec successfully responded to a log4j exploit scanner. If you set up your nginx log configuration per my post in support, and install the nginx collection as well as the log4j2 collection with an firewall iptable bouncer it will auto block any ip belonging to an attempt it parses out.

                        crowdsec crowdsecurity/apache_log4j2_cve-2021-44228 Ip 45.83.65.33 2021-12-17 07:55:25 2021-12-17 07:55:25

                        rmdesR 1 Reply Last reply
                        3
                        • M Mastadamus

                          @mastadamus I'm happy to report that Crowdsec successfully responded to a log4j exploit scanner. If you set up your nginx log configuration per my post in support, and install the nginx collection as well as the log4j2 collection with an firewall iptable bouncer it will auto block any ip belonging to an attempt it parses out.

                          crowdsec crowdsecurity/apache_log4j2_cve-2021-44228 Ip 45.83.65.33 2021-12-17 07:55:25 2021-12-17 07:55:25

                          rmdesR Offline
                          rmdesR Offline
                          rmdes
                          wrote on last edited by
                          #25

                          @mastadamus do you have a step by step instructions to setup crowdsec in a cloudron context ?

                          M 2 Replies Last reply
                          1
                          • rmdesR rmdes

                            @mastadamus do you have a step by step instructions to setup crowdsec in a cloudron context ?

                            M Offline
                            M Offline
                            Mastadamus
                            wrote on last edited by
                            #26

                            @rmdes I'll put one together later tonight.

                            1 Reply Last reply
                            1
                            • rmdesR rmdes

                              @mastadamus do you have a step by step instructions to setup crowdsec in a cloudron context ?

                              M Offline
                              M Offline
                              Mastadamus
                              wrote on last edited by
                              #27

                              @rmdes https://forum.cloudron.io/topic/6224/crowdsec-install-guide-for-cloudron-purposes

                              rmdesR 1 Reply Last reply
                              5
                              • M Mastadamus

                                @rmdes https://forum.cloudron.io/topic/6224/crowdsec-install-guide-for-cloudron-purposes

                                rmdesR Offline
                                rmdesR Offline
                                rmdes
                                wrote on last edited by
                                #28

                                @mastadamus thanks alot, will try to implement this & will report under your post 🙂

                                1 Reply Last reply
                                1
                                • nebulonN nebulon

                                  @necrevistonnezr ah ok, then this is fine. It is not exposed or anything.

                                  3 Offline
                                  3 Offline
                                  3gal
                                  wrote on last edited by
                                  #29

                                  @nebulon I found log4j2 libary usage in kutt (urlshortener)

                                  Standard config:

                                  # ONLY NEEDED FOR MIGRATION !!1!
                                  # Neo4j database credential details
                                  NEO4J_DB_URI=bolt://localhost
                                  NEO4J_DB_USERNAME=
                                  NEO4J_DB_PASSWORD=
                                  

                                  changed to this without errors:

                                  # ONLY NEEDED FOR MIGRATION !!1!
                                  # Neo4j database credential details
                                  #NEO4J_DB_URI=bolt://localhost
                                  #NEO4J_DB_USERNAME=neo4j
                                  #NEO4J_DB_PASSWORD=BjEphmupAf1D5pDD
                                  

                                  Is there anything else to do?
                                  Is that even a issue?

                                  girishG 1 Reply Last reply
                                  2
                                  • 3 3gal

                                    @nebulon I found log4j2 libary usage in kutt (urlshortener)

                                    Standard config:

                                    # ONLY NEEDED FOR MIGRATION !!1!
                                    # Neo4j database credential details
                                    NEO4J_DB_URI=bolt://localhost
                                    NEO4J_DB_USERNAME=
                                    NEO4J_DB_PASSWORD=
                                    

                                    changed to this without errors:

                                    # ONLY NEEDED FOR MIGRATION !!1!
                                    # Neo4j database credential details
                                    #NEO4J_DB_URI=bolt://localhost
                                    #NEO4J_DB_USERNAME=neo4j
                                    #NEO4J_DB_PASSWORD=BjEphmupAf1D5pDD
                                    

                                    Is there anything else to do?
                                    Is that even a issue?

                                    girishG Do not disturb
                                    girishG Do not disturb
                                    girish
                                    Staff
                                    wrote on last edited by
                                    #30

                                    @3gal neo4j and log4j are different. the former is a database and the latter is logging library. Kutt anyway is written in typescript and not affected by log4j issue.

                                    3 1 Reply Last reply
                                    3
                                    • girishG girish

                                      @3gal neo4j and log4j are different. the former is a database and the latter is logging library. Kutt anyway is written in typescript and not affected by log4j issue.

                                      3 Offline
                                      3 Offline
                                      3gal
                                      wrote on last edited by
                                      #31

                                      @girish ah i didnt even notice bevause of all the 4j notices my eyes where too open 🐶

                                      thx for looking at this anyway

                                      1 Reply Last reply
                                      0
                                      Reply
                                      • Reply as topic
                                      Log in to reply
                                      • Oldest to Newest
                                      • Newest to Oldest
                                      • Most Votes


                                      • Login

                                      • Don't have an account? Register

                                      • Login or register to search.
                                      • First post
                                        Last post
                                      0
                                      • Categories
                                      • Recent
                                      • Tags
                                      • Popular
                                      • Bookmarks
                                      • Search