Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

3136988 – [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in Reference Template for enabling ingestion and persistence of time series data in Azure

Description

Symptom

The Reference template for enabling ingestion and persistence of time series data in Azure uses a version of Open Source component Apache Log4j which has vulnerabilities CVE-2021-44228CVE-2021-45046CVE-2021-45105CVE-2021-44832.

Other Terms

Command Injection, OS command injection, Remote Code Execution, Log4j2, CVE-2021-44228CVE-2021-45046CVE-2021-45105CVE-2021-44832.

Solution

Please upgrade the Apache Log4j Core dependency (org.apache.logging.log4j:log4j-core) to version 2.17.1 in your implementation. You can also pull the latest changes from the sap-iot-hyperscaler-azure-integration-ref repository and check the pom.xml as an example.

 
 

Available fix and Supported packages

AZURE-IOT-INTEGRATION-REF|100|100|
 
Affected component

AZURE-IOT-INTEGRATION-REF

CVSS

CVSS v3.0 Base Score: 10.0/ 10 

Exploit


Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/3136988

TAGS

 Command Injection, OS command injection, Remote Code Execution, Log4j2, CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, CVE-2021-44832.

RedRays SAP Security Audit

RedRays SAP Security Audit

More to explorer

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.