LAST UPDATE: 2/16/2022 9:15 AM EST
Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.
OI Connector releases 2.0 through 2.1.3
NOTE - OI Connector 2.1.5 was shipped with log4j 2.17.1 and requires no additional remediation.
In the following steps the term <OIINSTALLDIR> should be replaced by the installation directory path of the NetOps OI Connector (usually /opt/CA/OIConnector).
#encoding=UTF-8
# Additional java parameters may be configured here to be used by all services
-Dlog4j2.formatMsgNoLookups=true
<Appenders>
<Console name="Console-Appender" target="SYSTEM_OUT">
<PatternLayout>
<pattern>[%-5level] %d{yyyy-MM-dd HH:mm:ss.SSS} [%t] %c{1} - %msg{nolookups}%n</pattern>
</PatternLayout>
</Console>
<RollingFile name="RollingFile-Appender"
fileName="${log-path}/OIConnector.log"
filePattern="${archive}/OIConnector.log.%d{yyyy-MM-dd}.gz">
<PatternLayout
pattern="[%-5level] %d{yyyy-MM-dd HH:mm:ss.SSS} [%t] %c{1} - %msg{nolookups}%n" />
<Policies>
<TimeBasedTriggeringPolicy />
<SizeBasedTriggeringPolicy size="30 MB" />
</Policies>
<DefaultRolloverStrategy max="20" />
</RollingFile>
</Appenders>
Note: Versions of the OI Connector 1.5 and older are not impacted. As long as the log4j.xml/properties isn't using %m or %msg, which it does not do by default, there is no impact.
If the log4j.xml file in those releases has been customized and does include the %m or %msg references apply the solution in the Resolution statement above.