Skip links
Vahagn Vardanian

Vahagn Vardanian

Co-founder and CTO of RedRays

3132964 – [CVE-2021-44228] Remote Code Execution vulnerability associated with Apache Log4j 2 component used in SAP Enable Now Manager

Description

Symptom

UPDATE 11th January 2022This note has been re-released with minor textual changes in ‘Solution’ section. We have added the information about the 2111 HF1 security hotfix.

UPDATE 24th December 2021: This note has been re-released with minor textual changes. There have not been any changes done which require customer action.

The SAP Enable Now Manager uses a version of Open Source component Apache Log4j which has vulnerabilities CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105.

Other Terms

Remote Code Execution, Log4Shell, Apache Log4j, CVE-2021-44228CVE-2021-45046CVE-2021-45105 , CVE-2021-44832

Reason and Prerequisites

SAP Enable Now Manager to version 2111 (build 10.5.7) are impacted.

CVE-2021-44228

The Apache Software Foundation has released a security advisory to address a remote code execution vulnerability (CVE-2021-44228) affecting Log4j versions 2.0-beta9 to 2.14.1. A remote attacker could exploit this vulnerability to take control of an affected system. Log4j is an open-source, Java-based logging utility widely used by enterprise applications and cloud services.

10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)

CVE-2021-45046

It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a denial of service (DOS) attack.

The original severity of this CVE was rated as Moderate; since this CVE was published security experts found additional exploits against the Log4j 2.15.0 release, that could lead to information leaks, RCE (remote code execution) and LCE (local code execution) attacks.

Base CVSS Score changed from 3.7 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) to 9.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).

CVE-2021-45105 

Apache Log4j2 versions 2.0-alpha1 through 2.16.0 did not protect from uncontrolled recursion from self-referential lookups. When the logging configuration uses a non-default Pattern Layout with a Context Lookup (for example, $${ctx:loginId}), attackers with control over Thread Context Map (MDC) input data can craft malicious input data that contains a recursive lookup, resulting in a StackOverflowError that will terminate the process. This is also known as a DOS (Denial of Service) attack. This issue was fixed in Log4j 2.17.0 and 2.12.3.

CVSS 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)

CVE-2021-44832

Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.

CVSS 6.6 (AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)

Solution

After we secured the SAP Enable Now Manager Cloud Edition on 13th of December 2021, we decided to release in addition a log4J related security hotfix. This new release has replaced the used log4J 2.14 version with the newest log4J 2.17.1 version only. 

The 2111 HF1 hotfix is already available on the SAP Support Portal (https://launchpad.support.sap.com/#/softwarecenter/search/SAP%2520Enable%2520Now) for our on-premise customers and all multi-tenant cloud instances have been updated on the 8./9.th of January 2022.

Workaround


SAP Enable Now – CE (HANA Cloud Edition)

To prevent exploiting there is no further action needed for SAP Enable Now – CE (HANA Cloud Edition), because the current version is not affected.

SAP Enable Now Manager On-Premise

  • For CVE-2021-44228: 

    To prevent exploiting the CVE-2021-44228 vulnerability please do the following:

    1. Go to TOMCAT\bin folder
    2. Execute TomcatXw.exe
    3. Go to Java tab
    4. Enter “-Dlog4j2.formatMsgNoLookups=true” to the Java options
    5. Restart the Tomcat

  • For CVE-2021-45046:Log4j 2.x SAP Enable Now Manager customers using the default Pattern Layout for logging are safe.
    Only in cases where a customer uses a non-default Pattern Layout, he might become affected.


    Mitigation:
    • Remove the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class

  • For CVE-2021-45105: SAP Enable Now Manager customers using the default Pattern Layout for logging are safe.
    Only in cases where a customer uses a non-default Pattern Layout, he might become affected.

    Mitigation:
    • Remove the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class

 

 
 

Available fix and Supported packages

WPB_MANAGER|1.0|1.0|
WPB_MANAGER_CE|10|10|
WPB_MANAGER_HANA|10|10|
 
Affected component

WPB_MANAGER

CVSS

CVSS v3.0 Base Score: 10,0 / 10
 

Exploit


Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.

URL

https://launchpad.support.sap.com/#/notes/3132964

TAGS

 
 

Remote Code Execution, Log4Shell, Apache Log4j, CVE-2021-44228CVE-2021-45046CVE-2021-45105 , CVE-2021-44832

Explore More

Special offer for SAP Security Udemy course!

$ 9.99

Join “SAP Security Core Concepts and Security Administration” which is part of the Blackhat course series.