Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Our products are not affected by this issue, since we use another logging-backend. Only the CMIS core of tia is affected and we will get in contact with the customers. If you have other software running, that might be exploitable, you can use the following ways to remediate the vulnerability:

1. Use a JVM with more secure defaults

When using Java 8, upgrade to Version 8u192 or above.

Since JVM 8u192 the JVM settings com.sun.jndi.rmi.object.trustURLCodebase and com.sun.jndi.rmi.object.trustURLCodebase are by default set to false. This fixes the vulnerability unless you override the defaults.

2. Fix it manually at servlet container level

Only apply this solution if you are sure, no other applications you depend on, running in the servlet container, make use of the vulnerable log4j feature. If you are unsure, you can safely apply solution three.

If you are using our reference servlet container tomcat, add the following line to bin/setenv.sh on Linux or bin/setenv.bat on Windows:

Linux:

Code Block
export JAVA_OPTS="$JAVA_OPTS -Dlog4j2.formatMsgNoLookups=true"

Windows:

Code Block
set "JAVA_OPTS=%JAVA_OPTS% -Dlog4j2.formatMsgNoLookups=true"

Other servlet container and application servers provide a similar way to set container settings at startup.

3. Fix it manually at application level.

Find the JndiLookup class delivered with log4j-core and delete it from the classpath.

Its location might be org/apache/logging/log4j/core/lookup/JndiLookup.class. But in most cases you have to search through the jar or war file. In question, contact the maintainer or consultant of the application.

...

To fix the vulnerability, please upgrade to the newest version of the affected KGS Product

This is the most simple and recommended way. New versions will be delivered in the following week (CW50).

...