Description
Symptom
The critical vulnerability known as Log4Shell (CVE-2021-44228) has been discovered in the logging library, Apache Log4j. Apache Log4j versions 2.0-beta9 to 2.14.1 are susceptible to a vulnerability that can allow remote code execution. This vulnerability has been given the maximum criticality score of 10.0 on the Common Vulnerability Scoring System.
Other Terms
Command Injection, OS command injection, Log4j2, CVE-2021-44228 , CVE-2021-45046, CVE-2021-45105, CVE-2021-44832
Solution
The patch associated with this note addresses the vulnerabilities tracked by all the CVE’s published for Log4j vulnerability.
For the version 13.4 – Please download and install the patched version of the software 13.4 Patch 5 by following the instructions below. This can be installed directly on top of any other 13.4 Patch version. This patch will remove Log4j from SAP ECT as it is not required.
For the version 14.2 – Please ensure you have already installed Patch 2 for 14.2 which had removed Log4j from SAP ECT. It can also be downloaded as per instructions below but clicking on 14.2 at the appropriate places.
Available for download at:
From https://launchpad.support.sap.com/#/softwarecenter
Click By ‘Alphabetical Index (A-Z)’
Click ‘E’
Scroll down and click on ‘SAP ENTRPRISE CNTNUS TSTNG OP’
Click ‘SAP ENTRPRISE CNTNUS TSTNG OP13.4’
Click ‘Support Packages and Patches’ button top right of screen
Click ‘TRICENTIS TOSCA COMMANDER 13.4’
Click ‘OPERATING SYSTEM’
Zip file for download is now visible names as patch 5
Available fix and Supported packages
N/A
CVSS
Exploit
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/3134139
TAGS
Command Injection, OS command injection, Log4j2, CVE-2021-44228 , CVE-2021-45046, CVE-2021-45105, CVE-2021-44832