Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

3136988 – [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in Reference Template for enabling ingestion and persistence of time series data in Azure

Description

Symptom

The Reference template for enabling ingestion and persistence of time series data in Azure uses a version of Open Source component Apache Log4j which has vulnerabilities CVE-2021-44228CVE-2021-45046CVE-2021-45105CVE-2021-44832.

Other Terms

Command Injection, OS command injection, Remote Code Execution, Log4j2, CVE-2021-44228CVE-2021-45046CVE-2021-45105CVE-2021-44832.

Solution

Please upgrade the Apache Log4j Core dependency (org.apache.logging.log4j:log4j-core) to version 2.17.1 in your implementation. You can also pull the latest changes from the sap-iot-hyperscaler-azure-integration-ref repository and check the pom.xml as an example.

 
 

Available fix and Supported packages

AZURE-IOT-INTEGRATION-REF|100|100|
 
Affected component

AZURE-IOT-INTEGRATION-REF

CVSS

CVSS v3.0 Base Score: 10.0/ 10 

Exploit


Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/3136988

TAGS

 Command Injection, OS command injection, Remote Code Execution, Log4j2, CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, CVE-2021-44832.

RedRays SAP Security Audit

RedRays SAP Security Audit

More to explorer

SAP Cloud Connector Certificate Validation Issue

Date of Release: February 13, 2024 Advisory ID: CVE-2024-25642 Affected Software: SAP Cloud Connector Versions Affected: 2.15.0 to 2.16.1 Vulnerability Summary:A critical vulnerability,