Skip links
Arpine Maghakyan

Arpine Maghakyan

Security Researcher of RedRays.

3136988 – [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in Reference Template for enabling ingestion and persistence of time series data in Azure

Description

Symptom

The Reference template for enabling ingestion and persistence of time series data in Azure uses a version of Open Source component Apache Log4j which has vulnerabilities CVE-2021-44228CVE-2021-45046CVE-2021-45105CVE-2021-44832.

Other Terms

Command Injection, OS command injection, Remote Code Execution, Log4j2, CVE-2021-44228CVE-2021-45046CVE-2021-45105CVE-2021-44832.

Solution

Please upgrade the Apache Log4j Core dependency (org.apache.logging.log4j:log4j-core) to version 2.17.1 in your implementation. You can also pull the latest changes from the sap-iot-hyperscaler-azure-integration-ref repository and check the pom.xml as an example.

 
 

Available fix and Supported packages

AZURE-IOT-INTEGRATION-REF|100|100|
 
Affected component

AZURE-IOT-INTEGRATION-REF

CVSS

CVSS v3.0 Base Score: 10.0/ 10 

Exploit

Exploit is not available.
For detailed information please contact the mail [email protected]

URL

https://launchpad.support.sap.com/#/notes/3136988

TAGS

 Command Injection, OS command injection, Remote Code Execution, Log4j2, CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, CVE-2021-44832.

RedRays SAP Security Audit

RedRays SAP Security Audit

More to explorer