Skip to main content
Support

KB Article #181999

Impact and resolution of CVE-2021-44228 (Log4Shell) in Validation Authority

Context

A 0-day vulnerability in the popular Java logging library, log4j, was published on GitHub along with a POC that shows the possibility of Remote Code Execution (RCE) if log4j logs an attacker-controlled string value, CVE-2021-44228.

Axway is aware of Log4j CVE-2021-44228 and is evaluating its impact on all Axway products. As conclusions and recommendations are available, we will be publishing them in the dedicated Alert on support.axway.com: https://support.axway.com/news/1331/lang/en

The current article intends to provide recommendations and technical clarifications with regards to the impact of CVE-2021-44228 in Validation Authority



Impacted Products

The impact derives from the use of Apache log4j within the products and all log4j versions between and including 2.0 and 2.14.1 are impacted. Some variations in impact exist based on the exact log4j and JRE version.


Validation Authority Server


Log4J N/A
JRE N/A
Impact None


Desktop Validator


Log4J N/A
JRE
N/A
Impact None


Server Validator


Log4J N/A
JRE
N/A
Impact None



VA Java Toolkit 4.11.2-SP5


Log4J 2.9.0
JRE
Oracle JDK 1.8
Impact

The toolkit is built with Log4j 2.9 but isn’t shipped with the toolkit.

By default, the java toolkit does not use the vulnerable classes (which were reported as vulnerable in log4j1).
Solution

The already released VA Java Toolkit 4.11.2-SP6 will upgrade logj4 to the non-vulnerable v2.16.0

The Log4j library being used in conjunction with the toolkit can remove the vulnerable classes without impacting the VA Java toolkit


VA Java Toolkit 5.0


Log4J 2.9.1
JRE
OpenJDK 11.0.x
Impact

The toolkit is built with Log4j 2.9 but isn’t shipped with the toolkit.

By default, the toolkit does not use the vulnerable classes (which were reported as vulnerable in log4j1).
Solution

The already released Java Toolkit December Update will upgrade logj4 to the non-vulnerable v2.16.0

The Log4j library being used in conjunction with the toolkit can remove the vulnerable classes without impacting the VA Java toolkit


Permanent Solution

Use log4j version 2.15 or higher.


CVE-2021-44228 vulnerability is solved in log4j version 2.15. Axway has already delivered releases for the VA Java Toolkit where log4j2 is upgraded to v2.16.0. These releases are 4.11.2-SP6 and 5.0 UP202112 which are already in GA status.


For VA Java Toolkit 4.11.2-SP5 and older OR VA Java Toolkit 5.0, customers can remove the vulnerable classes - JndiLookup and JndiManager classes for Log4j v2 and SocketServer* and JMSAppender classes for Log4j v1 - without impacting the VA Java toolkit.