CVE-2021-4104:
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default.
Log4j 1.x configurations without JMSAppender are not impacted by this vulnerability.
All supported DevTest releases.
JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration. The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228. Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default.
Log4j 1.x configurations without JMSAppender are not impacted by this vulnerability.
This vulnerability ONLY affects applications which are specifically configured to use JMSAppender, which is not the default, or when the attacker has write access to the Log4j configuration for adding JMSAppender to the attacker's JMS Broker.
If the Log4j configuration is set TopicBindingName or TopicConnectionFactoryBindingName configurations allowing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228 Log4j 2.x, Log4j 1.x is vulnerable.
An attacker who ALREADY has write access to the log4j configuration file will need to add JMSAppender into the configuration poisoned with malicious connection parameters. Also, note that poisoning the configuration file is not enough. The attacker also needs to force log4j to reload its configuration file with the poisoned parameters. Given that log4j 1.x does not offer automatic reloading, the poisoned configuration file will typically only become effective at application restart.
Note: DevTest does not support configuring JMSAppender by default. However, it makes some sense to make the job of the attacker even harder by following the below remediation steps.
Log4j 1.2 vulnerability CVE-2021-4104
These are the possible mitigations for Log4j 1.x:
a. Method # 1 (Manual)
b. Method # 2 (Patch)
Apply the attached log4j patched jars based on the SV version by following the steps mentioned in “README_STEPS.txt” inside the zip.
Note: The above steps also include the remediation of “CVE-2019-17571” vulnerability.