{"id":6436,"date":"2021-12-17T03:24:42","date_gmt":"2021-12-17T03:24:42","guid":{"rendered":"https:\/\/www.geekdecoder.com\/?p=6436"},"modified":"2021-12-17T03:24:42","modified_gmt":"2021-12-17T03:24:42","slug":"apachesolr-vulnerability-cve-2021-44228-for-log4j","status":"publish","type":"post","link":"https:\/\/www.qbytes.cloud\/index.php\/2021\/12\/17\/apachesolr-vulnerability-cve-2021-44228-for-log4j\/","title":{"rendered":"ApacheSolr vulnerability CVE-2021-44228 for Log4j"},"content":{"rendered":"<p>A vulnerability in Apache Log4j, a widely used logging package for Java has been found. The vulnerability, which can allow an attacker to execute arbitrary code by sending crafted log messages, has been identified as CVE-2021-44228 and given the name Log4Shell. It was first reported privately to Apache on November 24 and was patched with version 2.15.0 of Log4j on December 9. It affects Apache Struts, Apache Solr, Apache Druid, Elasticsearch, Apache Dubbo, and VMware vCenter. Since then, it has been disclosed that in certain non-default conditions, the original patch was incomplete; this was designated as CVE-2021-45046 and a new version of Log4j, 2.16.0, has been released.<\/p>\n<p><!--more--><\/p>\n<p>Obtaining the Mitigation for CVE-2021-44228 For cPanel<\/p>\n<p>You can run a cPanel Update which will update the cpanel-dovecot-solr RPM for you:<br \/>\nHow to update cPanel\/WHM<\/p>\n<p>To update cPanel &amp; WHM manually, use WHM\u2019s Upgrade to Latest Version interface (WHM &gt;&gt; Home &gt;&gt; cPanel &gt;&gt; Upgrade to Latest Version).<br \/>\nFor command line:<\/p>\n<p>To run this script on the command line, use the following format:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n\/usr\/local\/cpanel\/scripts\/upcp &#x5B;options]\n<\/pre>\n<p>Alternatively you could update just the cpanel-dovecot-solr RPM via YUM as the root user with the following command:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\nyum update cpanel-dovecot-solr\n<\/pre>\n<p>If you previously uninstalled cPanel Solr, you may install it again with the steps in this guide<br \/>\nHow to Install cPanel Solr<\/p>\n<p>Verifying That You Have The Mitigation In Place<\/p>\n<p>1. Login to the server via SSH or Terminal as the root user<br \/>\n2. Issue the following command:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\nrpm -q --changelog cpanel-dovecot-solr | grep -B1 CPANEL-39455\n<\/pre>\n<p>If the mitigation has been successfully added to your server you will see the following output:<br \/>\nCode:<\/p>\n<pre class=\"brush: bash; title: ; notranslate\" title=\"\">\n# rpm -q --changelog cpanel-dovecot-solr | grep -B1 CPANEL-39455\n* Fri Dec 10 2021 Tim Mullin &lt;tim@cpanel.net&gt; -  8.8.2-4.cp1180\n- CPANEL-39455: Add mitigation for CVE-2021-44228\n<\/pre>\n<p>For non cPanel Servers<br \/>\nhttps:\/\/github.com\/lunasec-io\/lunasec\/releases\/<br \/>\nhttps:\/\/github.com\/rubo77\/log4j_checker_beta\/blob\/main\/README.md<br \/>\nhttps:\/\/logging.apache.org\/log4j\/2.x\/download.html<\/p>\n<p>Resources:<\/p>\n<p>https:\/\/support.cpanel.net\/hc\/en-us\/articles\/4415775520919-ApacheSolr-vulnerability-CVE-2021-44228-for-Log4j<\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"DSlqb1cnw9\"><p><a href=\"https:\/\/blog.cpanel.com\/the-apache-log4j-exploit-and-how-to-protect-your-cpanel-server\/\">The Apache Log4j exploit and how to protect your cPanel server<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;The Apache Log4j exploit and how to protect your cPanel server&#8221; &#8212; cPanel Blog\" src=\"https:\/\/blog.cpanel.com\/the-apache-log4j-exploit-and-how-to-protect-your-cpanel-server\/embed\/#?secret=5rTTRvs3JD#?secret=DSlqb1cnw9\" data-secret=\"DSlqb1cnw9\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><br \/>\nhttps:\/\/www.greenbone.net\/en\/greenbones-log4j-vulnerability-test-coverage\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A vulnerability in Apache Log4j, a widely used logging package for Java has been found. The vulnerability, which can allow an attacker to execute arbitrary code by sending crafted log messages, has been identified as CVE-2021-44228 and given the name Log4Shell. It was first reported privately to Apache on November 24 and was patched with &#8230; <a title=\"ApacheSolr vulnerability CVE-2021-44228 for Log4j\" class=\"read-more\" href=\"https:\/\/www.qbytes.cloud\/index.php\/2021\/12\/17\/apachesolr-vulnerability-cve-2021-44228-for-log4j\/\" aria-label=\"Read more about ApacheSolr vulnerability CVE-2021-44228 for Log4j\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,20],"tags":[],"class_list":["post-6436","post","type-post","status-publish","format-standard","hentry","category-administration","category-cpanel"],"_links":{"self":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/posts\/6436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/comments?post=6436"}],"version-history":[{"count":0,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/posts\/6436\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/media?parent=6436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/categories?post=6436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.qbytes.cloud\/index.php\/wp-json\/wp\/v2\/tags?post=6436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}