Open mukul-tyagi opened 2 years ago
@mukul-tyagi please refer this MOS note:
Oracle Database and Apache log4j vulnerability CVE-2021-44228 (Doc ID 2828877.1)
DB is not affected by this vulnerability
@yunus-qureshi thanks for the reply , we have some queries then :-
@yunus-qureshi I can't access the doc ID link above either. We are using the docker image oracle/database:12.1.0.2-ee where we can see that this file /opt/oracle/product/12.1.0.2/dbhome_1/oui/jlib/jlib/log4j-core.jar is part of the image. Is this file not affected by CVE-2021-44228? If so any chance a patch or updated version of either 12.1.0.2 or 12.2.0.2 will be available?
Thanks in advance
Here are the detailed log by running log4shell: [90m10:19AM[0m [32mINF[0m identified vulnerable path [34mcve[0m: CVE-2021-44228 [34mfileName[0m: org/apache/logging/log4j/core/net/JndiManager$JndiManagerFactory.class [34mpath[0m: /opt/oracle/product/19c/dbhome_1/32218454/files/md/property_graph/lib/log4j-core-2.11.0.jar [34mseverity[0m: 10.0 [34mversionInfo[0m: "log4j 2.12.0-2.12.1" [90m10:19AM[0m [32mINF[0m identified vulnerable path [34mcve[0m: CVE-2021-44228 [34mfileName[0m: org/apache/logging/log4j/core/net/JndiManager$1.class [34mpath[0m: /opt/oracle/product/19c/dbhome_1/32218454/files/md/property_graph/lib/log4j-core-2.11.0.jar [34mseverity[0m: 10.0 [34mversionInfo[0m: "log4j 2.8.2-2.12.0" [90m10:19AM[0m [32mINF[0m identified vulnerable path [34mcve[0m: CVE-2021-44228 [34mfileName[0m: org/apache/logging/log4j/core/net/JndiManager.class [34mpath[0m: /opt/oracle/product/19c/dbhome_1/32218454/files/md/property_graph/lib/log4j-core-2.11.0.jar [34mseverity[0m: 10.0 [34mversionInfo[0m: "log4j 2.12.0-2.12.1" [90m10:19AM[0m [32mINF[0m identified vulnerable path [34mcve[0m: CVE-2021-44228 [34mfileName[0m: org/apache/logging/log4j/core/pattern/MessagePatternConverter.class [34mpath[0m: /opt/oracle/product/19c/dbhome_1/32218454/files/md/property_graph/lib/log4j-core-2.11.0.jar [34mseverity[0m: 10.0 [34mversionInfo[0m: "log4j 2.12" [90m10:19AM[0m [32mINF[0m identified vulnerable path [34mcve[0m: CVE-2021-44228 [34mfileName[0m: org/apache/logging/log4j/core/net/JndiManager$JndiManagerFactory.class [34mpath[0m: /opt/oracle/product/19c/dbhome_1/32218454/files/md/property_graph/pgx/server/pgx-webapp-3.2.0.war::WEB-INF/lib/log4j-core-2.11.0.jar [34mseverity[0m: 10.0 [34mversionInfo[0m: "log4j 2.12.0-2.12.1" [90m10:19AM[0m [32mINF[0m identified vulnerable path [34mcve[0m: CVE-2021-44228 [34mfileName[0m: org/apache/logging/log4j/core/net/JndiManager$1.class [34mpath[0m: /opt/oracle/product/19c/dbhome_1/32218454/files/md/property_graph/pgx/server/pgx-webapp-3.2.0.war::WEB-INF/lib/log4j-core-2.11.0.jar [34mseverity[0m: 10.0 [34mversionInfo[0m: "log4j 2.8.2-2.12.0" [90m10:19AM[0m [32mINF[0m identified vulnerable path [34mcve[0m: CVE-2021-44228 [34mfileName[0m: org/apache/logging/log4j/core/net/JndiManager.class [34mpath[0m: /opt/oracle/product/19c/dbhome_1/32218454/files/md/property_graph/pgx/server/pgx-webapp-3.2.0.war::WEB-INF/lib/log4j-core-2.11.0.jar [34mseverity[0m: 10.0 [34mversionInfo[0m: "log4j 2.12.0-2.12.1" [90m10:19AM[0m [32mINF[0m identified vulnerable path [34mcve[0m: CVE-2021-44228 [34mfileName[0m: org/apache/logging/log4j/core/pattern/MessagePatternConverter.class [34mpath[0m: /opt/oracle/product/19c/dbhome_1/32218454/files/md/property_graph/pgx/server/pgx-webapp-3.2.0.war::WEB-INF/lib/log4j-core-2.11.0.jar [34mseverity[0m: 10.0 [34mversionInfo[0m: "log4j 2.12" [90m10:19AM[0m [31mWRN[0m unable to open archive [31merror=[0m[31m"zip: not a valid zip file"[0m [34mpath[0m: /opt/oracle/product/19c/dbhome_1/javavm/lib/jce.jar [90m10:19AM[0m [31mWRN[0m unable to open archive [31merror=[0m[31m"zip: not a valid zip file"[0m [34mpath[0m: /opt/oracle/product/19c/dbhome_1/javavm/lib/sunjce_provider.jar [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/fd/3: no such file or directory"[0m [34mpath[0m: /proc/6/fd/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/fdinfo/3: no such file or directory"[0m [34mpath[0m: /proc/6/fdinfo/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/10/fd/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/10/fd/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/10/fdinfo/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/10/fdinfo/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/11/fd/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/11/fd/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/11/fdinfo/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/11/fdinfo/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/12/fd/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/12/fd/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/12/fdinfo/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/12/fdinfo/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/13/fd/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/13/fd/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/13/fdinfo/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/13/fdinfo/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/14/fd/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/14/fd/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/14/fdinfo/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/14/fdinfo/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/15/fd/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/15/fd/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/15/fdinfo/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/15/fdinfo/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/16/fd/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/16/fd/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/16/fdinfo/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/16/fdinfo/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/17/fd/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/17/fd/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/17/fdinfo/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/17/fdinfo/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/6/fd/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/6/fd/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/6/fdinfo/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/6/fdinfo/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/7/fd/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/7/fd/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/7/fdinfo/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/7/fdinfo/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/8/fd/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/8/fd/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/8/fdinfo/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/8/fdinfo/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/9/fd/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/9/fd/3 [90m10:19AM[0m [31mWRN[0m unable to access file [31merror=[0m[31m"lstat /proc/6/task/9/fdinfo/3: no such file or directory"[0m [34mpath[0m: /proc/6/task/9/fdinfo/3
CVE-2021-44228 also known as Log4Shell is a code interpretation vulnerability impacting Log4J. Log4j is a popular Java logging library used by many projects. This vulnerability is caused by an Improper Input Validation (CWE-20), Uncontrolled Resource Consumption (CWE-400) and Deserialization of Untrusted Data (CWE-502). This flaw is exploitable (for example) by using Java Naming and Directory Interface (JNDI), a java API use to connect to directory interfaces like LDAP. This vulnerability is exploitable because of log messages that could be executed. Remote authenticated attackers who can control log messages or log message parameters can execute arbitrary code loaded from attacker servers when message lookup substitution is enabled. This lookup will make possible to download a payload. The payload could contain remote Java class, executed by the server, will enable arbitrary code execution. The impact on confidentiality, integrity, and availability is rated as High. The attack complexity is considered as low.
Please update this log4j-core-2.11.0.jar in the binaries. Please refer to this link while updating the binaries for log4j.