Sandfly Security Not Vulnerable to the Log4j Exploit
Log4j漏洞(CVE-2021-44228)使许多Web应用易受攻击。Sandfly Security审计后确认不受影响。其唯一潜在风险来自使用的Elasticsearch组件,但评估显示不影响当前版本。即将发布的3.1版本完全移除相关依赖,确保安全。建议用户升级至3.1以彻底避免风险。 2025-5-26 05:33:6 Author: sandflysecurity.com(查看原文) 阅读量:14 收藏

Sandfly Blog

A recent disclosure of a severe bug in the log4j library (CVE-2021-44228) has made many web applications vulnerable to compromise. Sandfly Security has performed an audit and has determined we are not vulnerable based on currently known information.

The only potential exposure Sandfly has to the log4j vulnerability is through the one Java-based component in our stack, Elasticsearch. After evaluating our use of Elasticsearch and the versions of software involved, we do not believe the log4j vulnerability affects the version of Elasticsearch we are using.

The Elasticsearch team has provided the following information regarding the core Elasticsearch product, which is the only product we deploy with Sandfly:

Elasticsearch is not susceptible to remote code execution with this vulnerability due to our use of the Java Security Manager. Elasticsearch on JDK8 or below is susceptible to an information leak via DNS which is fixed by a simple JVM property change. The information leak does not permit access to data within the Elasticsearch cluster.

The version of the Elasticsearch Docker container that the latest version (3.0.5) of Sandfly launches is 7.14.1. This container includes a Java 16 runtime, so the information leak via DNS vulnerability is not applicable.

Proactive Mitigation

Based on the information available to us, we do not believe further action is required to protect Sandfly deployments from the log4j vulnerability. Out of an abundance of caution, customers may set the recommended JVM option which disables the vulnerable feature in log4j (the Elasticsearch version we use uses log4j 2.11.1, a version for which this mitigation is applicable).

If you wish to enable mitigations, please edit the file:

sandfly-setup/start_scripts/start_elastic.sh

Add the following additional environment variable to the Docker run command (e.g. between lines 44 and 45 of the script as it ships with Sandfly 3.0.5):

-e "ES_JAVA_OPTS=-Dlog4j2.formatMsgNoLookups=true" \

(Note the backslash at the end of the new line to ensure the following lines remain part of the docker run command.)

Sandfly 3.1 Coming Soon

Version 3.1 of Sandfly is about to be released and contains no Elasticsearch, Java or library dependencies that are vulnerable. Customers concerned about potential exposure to the log4j bug in Elasticsearch can simply upgrade to 3.1 and know they are 100% safe from this bug.

Thank you for your support.



文章来源: https://sandflysecurity.com/blog/sandfly-security-is-not-vulnerable-to-log4j-exploit
如有侵权请联系:admin#unsafe.sh