- Service Overview
- User Guide
- Best Practices
-
FAQs
-
Technologies
- How Do I Enable Cluster Protection?
- How Do I Disable Cluster Protection?
- What Should I Do If the Shield on a Node Is Offline?
- What Should I Do If I Have No Service Authorization Permissions or Fail to Create an Agency as an IAM User?
- How Often Are CGS Vulnerability Libraries Updated?
- When Does CGS Update and Back Up Logs?
- Where Can I Find My CGS Logs?
- Does the Shield Plug-in of CGS Affect My Services?
- Product Consultation
- Pricing
- Regions and AZs
- Change History
-
Technologies
- General Reference
Copied.
Can CGS Detect Apache Log4j2 Remote Code Execution Vulnerabilities?
Detection of the Apache Log4j2 Remote Code Execution Vulnerability
On December 16, Apache announced that in versions earlier than 2.16.0, there was a remote code execution vulnerability (CVE-2021-45046).
Apache Log4j2 is a widely used Java-based logging utility. If you are an Apache Log4j2 user, check your system and implement timely security hardening.
Reference: https://logging.apache.org/log4j/2.x/security.html
- Severity: important (Severity levels: low, moderate, important, and critical)
- Affected versions: all versions later than 2.0-beat9 and earlier than 2.16.0, excluding 2.12.2
- Upgrade affected applications and components, such as spring-boot-starter-log4j2, Apache Solr, Apache Flink, and Apache Druid.
- Secure versions: Apache Log4j 1.x and Apache Log4j 2.16.0
- Vulnerability handling
This vulnerability has been fixed in the official version. Upgrade all applications related to Apache Log4j2 to a secure version as soon as possible. Link: https://logging.apache.org/log4j/2.x/download.html
Java 8 (or later) users should upgrade to release 2.16.0.
Java 7 users should upgrade to release 2.12.2.
Huawei Cloud Container Guard Service (CGS) can scan private images for the vulnerability. The basic edition is free of charge. Log in to the CGS console, choose Image Security, click the Image Vulnerabilities tab, and click the Private Image Vulnerabilities tab. For details, see Managing Private Image Vulnerabilities.
NOTE:
- If the upgrade cannot be performed in a timely manner, run the following command to remove the JndiLookup class from the classpath, and restart the service.
zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
- Note: Before fixing vulnerabilities, back up your files and conduct a thorough test.
- If the upgrade cannot be performed in a timely manner, run the following command to remove the JndiLookup class from the classpath, and restart the service.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot