Good morning,
I wanted to ask about the vulnerability in question.
I installed graylog on a linux 20.04.3 machine, I upgraded from version 4.2.2 to version 4.2.3 through the repository
By checking the folder / usr / share / elasticsearch / lib7 I see that the following libraries appear:
log4j-api-2.11.1.jar and log4j-core-2.11.1.jar
so I assume that the update to version 4.2.3 did not update the libraries to version 2.15.0 as well
Can you suggest me how to update or mitigate this vulnerability
Thanks for taking the time
This is currently my graylog-server file, maybe just edit it, can you suggest me how?
Path to the java executable.
JAVA=/usr/bin/java
Default Java options for heap and garbage collection.
Yes, Elasticsearch has a vulnerability that must be addressed seperately to Graylog (they are seperate products).
See:
Affected Versions:
Elasticsearch versions 5.0.0+ contain a vulnerable version of Log4j. We’ve confirmed that the Security Manager mitigates the remote code execution attack in Elasticsearch 6 and 7; investigation is still underway for Elasticsearch 5.
but wouldn’t it be possible to see a configuration file with the change applied without having to get lost in a thousand guides?
A simple file where the option -Dlog4j2.formatMsgNoLookups = true appears?
I have problems with English and I struggle
https://www.graylog.org/post/graylog-update-for-log4j
on the Graylog site it is indicated that the graylog-server file must be modified, I posted mine, must it be modified?
If so, can someone repost it with the modified / added string?
Or write a series of steps to take?
Thank you @jan can you help me please ?
Is it enough to run the following command on 4.2.3 version ?
docker run -e GRAYLOG_SERVER_JAVA_OPTS=”-Dlog4j2.formatMsgNoLookups=true” graylog/graylog:4.2
This problem can be mitigated in previous versions (<2.16.0) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core - *. Jar org / apache / logging / log4j / core / lookup / JndiLookup .classe ).
Is it possible to make this setting on graylog?
Or is it possible to migrate to version 2.16.0 on graylog?
Hey there, new to the Graylog game
We are currently setting up our first Graylog.
Am I seeing this right, If I want to be save log4shell wise, I´d have to use a pretty old version of ES, 6.8.21 since the up todate version of ES won´t work with graylog?
Or running the 7.10 with the Java Security Manager and option to disable the lookups?
Not sure what would be the most secure way, since graylog will hold some sensible data…
Cheers
It would be useful to be able to upgrade to version 2.16.0 of the libraries, in this way it would not be a mitigation but a real resolution of the vulnerability
Is it possible to just replace the log4j file in Graylog i.e unpack /repack jar? For some people they may be on versions that are not supported i.e less then 3.3
We got a vulnerability as well in graylog-collector ver 0.4.2 in RHEL 7, removing the classes is immediate remediation. Is there a new package that already patched this or upgraded the log4j to the new version?
Results of scan…
Scanning directory: / (without /dev, /dev/shm, /run, /sys/fs/cgroup, /var/lib/sitedata/prod, /run/user/18981, /run/user/0)
Running scan (10s): scanned 22574 directories, 1515665 files, last visit: /usr/lib/jvm-exports/java-1.8.0-openjdk-1.8.0.302.b08-0.el7_9.x86_64
[*] Found CVE-2021-44228 (log4j 2.x) vulnerability in /usr/share/graylog-collector/graylog-collector.jar, log4j 2.4.1
Scanned 30471 directories and 1370453 files
Found 1 vulnerable files
Found 0 potentially vulnerable files
Found 0 mitigated files
Completed in 17.80 seconds
rpm -qi graylog-collector
Name : graylog-collector
Version : 0.4.2
Release : 1
Architecture: noarch
Install Date: Fri 26 Oct 2018 03:01:30 PM NZDT
Group : optional
Size : 11335101
License : GPLv3
Signature : RSA/SHA1, Tue 05 Jan 2016 01:17:02 AM NZDT, Key ID d44c1d8db1606f22
Source RPM : graylog-collector-0.4.2-1.src.rpm
Build Date : Tue 05 Jan 2016 01:16:56 AM NZDT
Build Host : 2c345862f441
Relocations : /
Packager : Graylog, Inc. hello@graylog.org
Vendor : graylog
URL : https://www.graylog.org/
Summary : Graylog collector
Description :
Graylog collector