Security

Log4Shell: CVE-2021-44228

By Nick Schuch12th December 2021

This blog post is for tracking the Skpr platform team's response to the Log4Shell Zero-Day vulnerability (CVE-2021-44228).

Affected Services

  • Solr
  • OpenSearch (Elasticsearch)

Current Status

The Skpr platform team has quickly responded with mitigations at both the firewall and service levels.

We are tracking upstream changes to both Solr and OpenSearch projects for any additional mitigations or updates.

Details

Solr

The Log4Shell behavior has been disabled using the environment variable LOG4J_FORMAT_MSG_NO_LOOKUPS=true as per this Docker blog post.

The environment variable will remain until upstream Solr images ship with log4j2 2.15.0 which enables this behavior by default.

OpenSearch

The AWS WAF Managed Ruleset AWSManagedRulesKnownBadInputsRuleSet has been applied to all affected clusters. This managed ruleset contains rules for explicitly blocking requests which exploit this vulnerability.

All Opensearch services have received the R20211203-P2 patch which resolves the issue.

Tags

cve

Getting Started

Interested in a demo?

🎉 Awesome!

Please check your inbox for a confirmation email. It might take a minute or so.

🤔 Whoops!

Something went wrong. Check that you have entered a valid email and try submitting the form again.

We'll be in touch shortly.