-
-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2021-44228 vulnerability Log4j (Solr)? #4375
Comments
How exactly can we access Solr from outside?
Mit besten Grüßen
André Peters
… Am 11.12.2021 um 11:28 schrieb DEZEIRAUD Gaëtan ***@***.***>:
Prior to placing the issue, please check following: (fill out each checkbox with an X once done)
I understand that not following or deleting the below instructions will result in immediate closure and/or deletion of my issue.
I have understood that this bug report is dedicated for bugs, and not for support-related inquiries.
I have understood that answers are voluntary and community-driven, and not commercial support.
I have verified that my issue has not been already answered in the past. I also checked previous issues.
Summary
Mailcow is vulnerable to CVE-2021-44228 Log4j?
https://community.mailcow.email/d/1229-cve-2021-44228-vulnerability-solr
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub, or unsubscribe.
|
Don't know. It is more a question about if mailcow is potentially vulnerable or not. |
You are fine.
Images should be updated asap anyway.
… Am 11.12.2021 um 11:36 schrieb DEZEIRAUD Gaëtan ***@***.***>:
Don't know. It is more a question about if mailcow is potentially vulnerable or not.
By security, I have shutdown my mail servers until I get an answer.
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub, or unsubscribe.
|
theoretically trivial How? |
Seems Solr doesnt even have an update ready on their site: https://solr.apache.org/downloads.html Either way: We need to update to 8.x sooner or later since this is their stable release for now. |
It is enough that a bad string is sent somewhere and which arrives to solr which logs it and it is finished. Code execution. |
I've just disabled Solr on my mailcow servers to mitigate any potential risk from this, and everything seems to be working to the point I don't even know if to bother turning it back on when it's fixed (for reference for anybody reading who isn't sure: set |
An easy workaround would be to use the "fix/workaround" suggested in apache/solr#454 (comment) |
@marc1006 Can you write an explanation of how to do this? Step by step. |
At best, this should be fixed in the solr image used by Mailcow by the maintainer of Mailcow. Probably by either adapting this file https://github.com/mailcow/mailcow-dockerized/blob/master/data/Dockerfiles/solr/solr.sh or the Dockerfile https://github.com/mailcow/mailcow-dockerized/blob/master/data/Dockerfiles/solr/Dockerfile Note: I'm not familiar with the Mailcow code base. @Brouilles
Once there is a fix in Mailcow, you will need to revert/undo the changes I suggested (and delete the mailcow/solr:tmpfix docker image) before updating Mailcow!!!! |
Thanks @jonprocter I have do the same. |
is pushed. am i correct in assuming that this resolves the vulnerability CVE-2021-44228 @andryyy |
The Solr vulnerability was fixed, yes. mailcow was never directly affected. |
I am not so sure. https://twitter.com/gossithedog/status/1469993248559140864?s=21 |
WTF? Why are you spreading this crap? What is wrong with you?
It was not affected.
Post how you exploit it or stfu. Sigh.
… Am 12.12.2021 um 17:03 schrieb DEZEIRAUD Gaëtan ***@***.***>:
The Solr vulnerability was fixed, yes.
mailcow was never directly affected.
I am not so sure. https://twitter.com/gossithedog/status/1469993248559140864?s=21
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub, or unsubscribe.
|
that's great, thanks! |
Checking solr.log in the solr container reveals that every search via the UI is logged verbatim:
solr uses log4j, so I would not say that it is not affected at all. |
@andryyy Could you gave some details how is was fixed ? Because your Solr docker images still uses version 7.7.3. |
I was curious myself, so I compared 1.7 and 1.8: /opt/docker-solr/scripts/start-local-solr
/opt/docker-solr/scripts/solr-fg
|
It uses this patch now: docker-solr/docker-solr@74d04b4 |
1.8 uses jvm property "-Dlog4j2.formatMsgNoLookups=true" so it should be safe EDIT: blargh. I was too slow 😉 Sorry for basically repeating the contentof the two previous posts 😓 |
Okay I can confirm that setting is set. 👍🏻 |
Ah yes, the classic "it's not an issue til it becomes an issue". |
Latest insight: to set the system property https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046 |
Yep indeed, but solr is still not affected:
|
well... you can use: [Windows] set "START_OPTS=%START_OPTS% -Dlog4j2.formatMsgNoLookups=true" [Linux] update SOLR_START_OPTS=(...) adding "-Dlog4j2.formatMsgNoLookups=true" whereever you want inside brackets |
Prior to placing the issue, please check following: (fill out each checkbox with an
X
once done)Summary
Mailcow is vulnerable to CVE-2021-44228 Log4j?
https://community.mailcow.email/d/1229-cve-2021-44228-vulnerability-solr
The text was updated successfully, but these errors were encountered: