Description
Symptom
UPDATE 11th January 2022: This note has been re-released with minor textual changes in ‘Solution’ section. We have added the information about the 2111 HF1 security hotfix.
UPDATE 24th December 2021: This note has been re-released with minor textual changes. There have not been any changes done which require customer action.
The SAP Enable Now Manager uses a version of Open Source component Apache Log4j which has vulnerabilities CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105.
Other Terms
Remote Code Execution, Log4Shell, Apache Log4j, CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 , CVE-2021-44832
Reason and Prerequisites
SAP Enable Now Manager to version 2111 (build 10.5.7) are impacted.
The Apache Software Foundation has released a security advisory to address a remote code execution vulnerability (CVE-2021-44228) affecting Log4j versions 2.0-beta9 to 2.14.1. A remote attacker could exploit this vulnerability to take control of an affected system. Log4j is an open-source, Java-based logging utility widely used by enterprise applications and cloud services.
10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in a denial of service (DOS) attack.
The original severity of this CVE was rated as Moderate; since this CVE was published security experts found additional exploits against the Log4j 2.15.0 release, that could lead to information leaks, RCE (remote code execution) and LCE (local code execution) attacks.
Base CVSS Score changed from 3.7 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L) to 9.0 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H).
Apache Log4j2 versions 2.0-alpha1 through 2.16.0 did not protect from uncontrolled recursion from self-referential lookups. When the logging configuration uses a non-default Pattern Layout with a Context Lookup (for example, $${ctx:loginId}), attackers with control over Thread Context Map (MDC) input data can craft malicious input data that contains a recursive lookup, resulting in a StackOverflowError that will terminate the process. This is also known as a DOS (Denial of Service) attack. This issue was fixed in Log4j 2.17.0 and 2.12.3.
CVSS 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.
CVSS 6.6 (AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H)
Solution
After we secured the SAP Enable Now Manager Cloud Edition on 13th of December 2021, we decided to release in addition a log4J related security hotfix. This new release has replaced the used log4J 2.14 version with the newest log4J 2.17.1 version only.
The 2111 HF1 hotfix is already available on the SAP Support Portal (https://launchpad.support.sap.com/#/softwarecenter/search/SAP%2520Enable%2520Now) for our on-premise customers and all multi-tenant cloud instances have been updated on the 8./9.th of January 2022.
Workaround
SAP Enable Now – CE (HANA Cloud Edition)
To prevent exploiting there is no further action needed for SAP Enable Now – CE (HANA Cloud Edition), because the current version is not affected.
SAP Enable Now Manager On-Premise
- For CVE-2021-44228:
To prevent exploiting the CVE-2021-44228 vulnerability please do the following:
- Go to TOMCAT\bin folder
- Execute TomcatXw.exe
- Go to Java tab
- Enter “-Dlog4j2.formatMsgNoLookups=true” to the Java options
- Restart the Tomcat
- For CVE-2021-45046:Log4j 2.x SAP Enable Now Manager customers using the default Pattern Layout for logging are safe.
Only in cases where a customer uses a non-default Pattern Layout, he might become affected.
Mitigation:- Remove the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
- Remove the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
- For CVE-2021-45105: SAP Enable Now Manager customers using the default Pattern Layout for logging are safe.
Only in cases where a customer uses a non-default Pattern Layout, he might become affected.
Mitigation:- Remove the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
Available fix and Supported packages
WPB_MANAGER
CVSS
Exploit
Detailed vulnerability information added to RedRays Security Platform. Contact [email protected] for details.
URL
https://launchpad.support.sap.com/#/notes/3132964
TAGS
Remote Code Execution, Log4Shell, Apache Log4j, CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 , CVE-2021-44832