KB Article #181931
Critical issue in Apache Log4j logging utility used by Axway EBICS Products
Context
A 0-day vulnerability in the popular Java logging library, log4j, was published on GitHub along with a POC that shows the possibility of Remote Code Execution (RCE) if log4j logs an attacker-controlled string value, CVE-2021-44228.
Axway is aware of Log4j CVE-2021-44228 and is evaluating its impact on all Axway products. As conclusions and recommendations are available we will be publishing them in the dedicated Alert on support.axway.com.
The current article intends to provide recommendations and technical clarifications with regards to the impact of CVE-2021-44228 in EBICS Products.
Resolution
The impact derives from the use of Apache log4j within the products and all log4j versions between and including 2.0 and 2.14.1 are impacted. Some variations in impact exist based on the exact log4j and JRE version.
Permanent Solution
Permanent solution: use Apache log4j version 2.17.1 or higher. All products potentially impacted will issue patches to include log4j 2.17.1 for all supported versions. ETAs for these patches will be communicated shortly.
Product | EBICS Gateway | Version | 3.5 | Impact | Vulnerability confirmed | ||||
Additional Notes | The impacts on Passport, Secure Relay and Sentinel are explained in the following pages : | ||||||||
Log4J Version | 2.13.3 - This version is used in the product Ebics Gateway. The vulnerability is confirmed. See below the mitigation plan. 1.2.17 - This version is used by the libraries that are used in the Ebics Gateway. The code reported as vulnerable is not present. At the moment, there is no evidence to show that Log4j version 1.2.17 is vulnerable to the CVE-2021-44228. Moreover the JMS Appender is not used. | ||||||||
Mitigation | Mitigation for 3.5 version
Important Notes:
Linux/Unix:Step 1: Stop EBICS Gateway Step 2: Go in EBICS Gateway installation folder cd < installationDir> Step 3: log 4j libraries need to be updated on below locations to remove vulnerable classes: a) program\tool\lib\jar - To update follow Step 5. d) applicationServer\standalone\deployments\bankrechner.ear\APP-INF\lib\ log4j-core-2.13.3.jar. To update this jar, follow below process: i) Create a new folder For. e.g <UpdatedEARContents> and run below command in that folder - Note: This will repackage the updated jar in the ear. iv) Replace the above bankrechner.ear in below folder - v) Delete bankrechner.deployed file from <installationDir>/applicationServer/standalone/deployments Step 4: Remove vulnerable classes from log4j v2. For each .jar file reported at the previous step use zip program to remove class JndiLookup.class and JndiManager.class
For each .jar file reported at previous step verify if the classes were removed properly
Step 5: Remove vulnerable classes from log4j v1. For each .jar file reported at the previous step use zip program to remove following vulnerable classes:
For each .jar file reported at previous step verify if the classes were removed properly
Step 6: Start EBICS gateway. WINDOWS:Step 1: Stop EBICS Gateway Step 2: Go in EBICS Gateway installation folder cd <install_dir> Step 3: a) program\tool\lib\ - jar - To update follow Step 5. d) applicationServer\standalone\deployments\bankrechner.ear\APP-INF\lib - log4j-core-2.13.3.jar - To update follow Step 4. Step 4: Remove vulnerable classes from log4j v2. For each log4j-core file reported at previous step open the jar file in a zip manager tool(like 7-Zip) and remove classes:
Step 5: Remove vulnerable classes from log4j v1. For each log4j file reported at previous step open the jar file in a zip manager tool(like 7Zip) and remove classes:
Step 6: Start EBICS Gateway | ||||||||
Long term solution | The service pack 3.5 SP4 that upgrade to the version 2.17.1 of Apache Log4j has been released on 04th of January 2022. |
Product | EBICS Gateway | Version | 3.4 | Impact | There is no evidence of the vulnerability to the CVE-2021-44228 |
Additional Notes | The impacts on Passport, Secure Relay and Sentinel are explained in the following pages: | ||||
Log4J Version | 1.2.15 | ||||
Mitigation | The code reported as vulnerable is not present. At the moment, there is no evidence to show that Log4j version 1.2.15 is vulnerable to the CVE-2021-44228. Moreover the JMS Appender is not used.. | ||||
Long term solution | Upgrade to the EBICS Gateway version 3.5. |
Product | EBICS Gateway | Version | 3.3.0 | Impact | There is no evidence of the vulnerability to the CVE-2021-44228 |
Additional Notes | The impacts on Passport, Secure Relay and Sentinel are explained in the following pages : | ||||
Log4J Version | 1.2.15 | ||||
Mitigation | The code reported as vulnerable is not present. At the moment, there is no evidence to show that Log4j version 1.2.15 is vulnerable to the CVE-2021-44228. Moreover the JMS Appender is not used.e. | ||||
Long term solution | Upgrade to the EBICS Gateway version 3.5. |
Product | EBICS Gateway | Version | 3.2.2 | Impact | There is no evidence of the vulnerability to the CVE-2021-44228 |
Additional Notes | The impacts on Passport, Secure Relay and Sentinel are explained in the following links | ||||
Log4J Version | 1.2.15 | ||||
Mitigation | The code reported as vulnerable is not present. At the moment, there is no evidence to show that Log4j version 1.2.15 is vulnerable to the CVE-2021-44228. Moreover the JMS Appender is not used. | ||||
Long term solution | Upgrade to the EBICS Gateway version 3.5. |
Product | Electronic Signature | Version | 2.13 | Impact | There is no evidence of the vulnerability to the CVE-2021-44228 issue | ||
Additional Notes | The impacts on Passport, Secure Relay and Sentinel are explained in the following pages: | ||||||
Log4J Version | 1.2.17 | ||||||
Mitigation | Mitigations for Electronic Signature 2.13
Important notes:
LINUX/UNIXStep 1: Stop Electronic Signature Step 2: Go in Electronic Signature installation folder cd <install_dir> Step 3: Find all log4j v1 jar files in current folder using a command like: find . -name 'log4j-1.2.*.jar' Step 4: Remove vulnerable classes from log4j v1. For each .jar file reported at the previous step use zip program to remove following vulnerable classes:
For each .jar file reported at previous step verify if the classes were removed properly:
Step 6: Start Electronic Signature. WINDOWSStep 1: Stop Electronic Signature Step 2: Go in Electronic Signature installation folder cd <install_dir> Step 3: Find all log4j v1 jar files in current folder, for example by using a command like: dir /b /s log4j.jar Step 4: Remove vulnerable classes from log4j v1. For each log4j file reported at previous step open the jar file in a zip manager tool(like 7Zip) and remove classes:
Step 6: Start Electronic Signature | ||||||
Long term solution | A service pack that upgrade to the version 2.17.1 or greater of Apache Log4j will be released as soon as possible. The release date is set to beginning of February 2022. |
Product | Electronic Signature | Version | 2.12 | Impact | There is no evidence of the vulnerability to the CVE-2021-44228 issue |
Additional Notes | The impacts on Passport, Secure Relay and Sentinel are explained in the following pages: | ||||
Log4J Version | 1.2.17 | ||||
Mitigation | The code reported as vulnerable is not present. At the moment, there is no evidence to show that Log4j version 1.2.17 is vulnerable to the CVE-2021-44228. Moreover the JMS Appender is not used.e | ||||
Long term solution | Upgrade to the Electronic Signature version 2.13. |
Product | Electronic Signature | Version | 2.10.3 | Impact | There is no evidence of the vulnerability to the CVE-2021-44228 issue |
Additional Notes | The impacts on Passport, Secure Relay and Sentinel are explained in the following pages. | ||||
Log4J Version | 1.2.17 | ||||
Mitigation | The code reported as vulnerable is not present. At the moment, there is no evidence to show that Log4j version 1.2.17 is vulnerable to the CVE-2021-44228. Moreover the JMS Appender is not used.e | ||||
Long term solution | Upgrade to the Electronic Signature version 2.13. |
Product | Electronic Signature | Version | 2.9.2 | Impact | There is no evidence of the vulnerability to the CVE-2021-44228 issue |
Additional Notes | The impacts on Passport, Secure Relay and Sentinel are explained in the following pages. | ||||
Log4J Version | 1.2.17 | ||||
Mitigation | The code reported as vulnerable is not present. At the moment, there is no evidence to show that Log4j version 1.2.17 is vulnerable to the CVE-2021-44228. Moreover the JMS Appender is not used.e | ||||
Long term solution | Upgrade to the Electronic Signature version 2.13. |
Product | EBICS Client | Version | 1.1 | Impact | There is no evidence of the vulnerability to the CVE-2021-44228 issue |
Additional Notes | The impacts on Secure Relay and Sentinel are explained in the following pages.
| ||||
Log4J Version | 1.2.17 1.2.15(Runtime) | ||||
Mitigation | A service pack that upgrade to the version 2.17.1 or greater of Apache Log4j will be released. | ||||
Long term solution | A service pack that upgrade to the version 2.17.1 or greater of Apache Log4j will be released. The release date is set to end of January 2022. |