Are any of the components of CA Service Catalog affected by the log4j vulnerability that was announced recently - CVE-2021-44228.
Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled
Service Catalog 17.3 (Containers)
This vulnerability affects all versions of log4j from 2.0-beta9 to 2.14.1
Please follow below steps to implement the workaround to avoid the vulnerability:
Search for "wrapper.java.additional.xx" and add the following entries after it. The xx is the last active sequence value in viewService.config file and varies as per your environment.
wrapper.java.additional.xx=-Dlog4j2.formatMsgNoLookups=true
For example, if the search string contains 24 i.e "wrapper.java.additional.24", add the following entry after it.
2. Save the file.
5) Open log4j.xml file in the same location and perform the below steps:
6)Navigate to the Kubernetes dashboard and scale up the pods to 1 or more(as per your configuration)