Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Critical Log4j security issue affects elasticsearch (0-day RCE!) #85

Closed
wornet-aer opened this issue Dec 13, 2021 · 3 comments
Closed

Comments

@wornet-aer
Copy link
Contributor

Possible Mitigation: elastic/elasticsearch#81618

But we need to make sure, that the fix breaks no OTOBO functionalities.

wornet-aer added a commit to wornet-aer/otobo-docker that referenced this issue Dec 13, 2021
Mitigate Log4j CVE in Elasticsearch by using an ENV variable. Adresses RotherOSS#85
@svenoe
Copy link

svenoe commented Dec 13, 2021

Hey Andreas,

thanks for the pr. We are having an eye on the situation, the elastic team has released a detailed statement which clearly claims, that neither the remote code execution nor the dns-lookup vulnerability apply to us, as OTOBO docker currently runs with JDK 16: https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476

In the github issue you cited there was an indirect claim, that Elasticsearch is vulnerable in general, but it was explained by @xeraa, that the example came from a system not only using Elasticsearch, after that. If you read that differently or have other information, please share it. Applying the hotfix is no real problem, but in the end we also had to release a new version of otobo, and I would rather do that based on more information, atm.

(Also the environment variables set in the elastic container should be harmless, even if they can be leaked.)

@xeraa
Copy link

xeraa commented Dec 14, 2021

I don't really know what rotheross/otobo-elasticsearch:latest is (https://github.com/RotherOSS/otobo-docker/blob/rel-10_0/.docker_compose_env_http#L54), but if you are on a recent 6.x or 7.x version you have avoided the worst. I'd still upgrade to the latest patch version of today to be on the safe side :)

@svenoe
Copy link

svenoe commented Dec 14, 2021

Hi @xeraa - thanks for dropping by and yes, we intent to.

I will close this issue here, as this is set in otobo (an open source ticketing system and helpdesk, which optionally can use Elasticsearch) directly. I opened RotherOSS/otobo#1505 - we will have to run some tests today before doing so, though.

Best regards, Sven

@svenoe svenoe closed this as completed Dec 14, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants