A critical vulnerability within the Apache Log4j package (https://nvd.nist.gov/vuln/detail/CVE-2021-44228) discovered on 12/09/2021. This vulnerability affects all versions of log4j from 2.0-beta9 to 2.14.1
Rally SaaS
Rally On-premises
Rally Adapter for Jira
LAC
CVE-2021-44228
Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled
This vulnerability affects all versions of log4j from 2.0-beta9 to 2.14.1
Rally SaaS and Rally onPrem are not affected by this vulnerability as Rally Software does not use the affected versions of log4j so there is no reason to take any remediation steps.
Rally Adapter for Jira is leveraging LAC’s External Logging and hence might be susceptible to this vulnerability. Below is the listed set of steps to mitigate this vulnerability based on each version of the Adapter.
This vulnerability is already mitigated through the removal of the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class. No action from customers is needed.
Updating to the latest version of Rally Adapter for Jira (version 3.4) is recommended for customers running version 3.3 or lower to properly remediate this vulnerability.
If an upgrade is not possible, this vulnerability can be mitigated by adding the environment variable LOG4J_FORMAT_MSG_NO_LOOKUPS" and setting it to "true" by following either of the two options listed below.
```
- name: LOG4J_FORMAT_MSG_NO_LOOKUPS
value: "true"
```
Alternatively the the kots admin console user interface can be used to generate the download/upload command via the tab "View Files" via the panel `Need to edit these files? Click here to learn how` on top of that screen.
```
- name: LOG4J_FORMAT_MSG_NO_LOOKUPS
value: "true"
```
Both Options will be persistent and work regardless of future changes in the configuration or any kind of deployment/redeployment
Note: Beware that yaml insists on 2 spaces as indentation so do not use hard tabs.
Given the fact that Adapter is installed behind customer firewalls and does not have any endpoints exposed - Following firewall hardening recommendations listed below would be required to mitigate risk of exploiting this vulnerability from a public network.
If you have further questions or need assistance with the mitigation steps, please contact our support team or your Rally Solution Engineer.