Document toolboxDocument toolbox

MettleCI Product Security Advisory - Log4j Vulnerable To Remote Code Execution - CVE-2021-44228

Summary

CVE-2021-44228 - Log4j vulnerable to remote code execution

Original Advisory Release Date

20 Dec 2021 09:00 UTC (Coordinated Universal Time, +0 hours)

CVE ID

CVE-2021-44228

As of this advisory, Data Migrators has learned:

  • No MettleCI components are vulnerable to CVE-2021-44228

  • Some MettleCI components included an unused log4j-core component which has been removed in the latest update to those components (see below for details).

Read the “Impact On…” sections below to determine if you are affected, and how to protect affected installations.

Summary of Vulnerability

The following sources provide descriptions of the vulnerability at various levels of technical detail.

Impact On IBM OEM-Licensed Releases

In a number of MettleCI components, we use Log4j but mostly an older version that is required for compatibility with some of the build tools that our software supports (e.g. Atlassian Bamboo) and is unaffected by the CVE.

Component

Versions Assessed

CVE-2021-44228 Exposure

Remediation Actions

Component

Versions Assessed

CVE-2021-44228 Exposure

Remediation Actions

Workbench

1.0-1363

Not exposed. Doesn’t use Log4j.

None required

Unit Test Harness

1.0-344

Not exposed. Log4j 1.2.17 used but this version pre-dates the presence of the CVE-triggering feature.

None required.

CLI (AKA Command Shell)

1.1-123

Not exposed. Log4j 1.2.17 used but this version pre-dates the presence of the CVE-triggering feature.

None required.

CLI Plugins (see exceptions below)

Multiple

Not exposed. Log4j 1.2.17 used but this version pre-dates the presence of the CVE-triggering feature.

None required.

Transmuter CLI Plugin

1.0-29

Not exposed. Contains the vulnerable Log4j classes but they are never loaded during execution.

Removed vulnerable log4j classes.

End-user mitigation actions aren’t required in lieu of deploying the up-coming CVE-focused release of this plug-in to IBM Fix Central.

Note: this is only for customers whose MettleCI entitlement is via IBM and who acquire their MettleCI software from IBM, via Passport Advantage / Fix Central.

Bamboo Native Plugins

As per CLI Plugins above.

Not exposed. Log4j 1.2.17 used but this version pre-dates the presence of the CVE-triggering feature.

None required.

Impact On DM Directly-Licensed Releases

In a number of MettleCI components, we use Log4j but mostly an older version that is required for compatibility with some of the build tools that our software supports (e.g. Atlassian Bamboo) and is unaffected by the CVE.

Component

Versions Assessed

CVE-2021-44228 Exposure

Remediation Actions

Component

Versions Assessed

CVE-2021-44228 Exposure

Remediation Actions

Workbench

1.0-1363

Not exposed. Doesn’t use Log4j.

None required

Unit Test Harness

1.0-344

Not exposed. Log4j 1.2.17 used but this version pre-dates the presence of the CVE-triggering feature.

None required.

CLI (AKA Command Shell)

1.1-123

Not exposed. Log4j 1.2.17 used but this version pre-dates the presence of the CVE-triggering feature.

None required.

CLI Plugins (see exceptions below)

Multiple

Not exposed. Log4j 1.2.17 used but this version pre-dates the presence of the CVE-triggering feature.

None required.

Transmuter CLI Plugin

1.0-29

Not exposed. Contains the vulnerable Log4j classes but they are never loaded during execution.

Removed vulnerable Log4j classes.

End-user mitigation actions aren’t required in lieu of deploying the up-coming CVE-focused release of this plug-in to

Note: This is only for customers whose MettleCI software entitlement comes directly from Data Migrators or via IBM Expert Labs.

Bamboo Native Plugins

As per CLI Plugins above.

Not exposed. Log4j 1.2.17 used but this version pre-dates the presence of the CVE-triggering feature.

None required.

MettleCI Software Publication Systems

The back end to our non-OEM software distribution site has components that run on AWS Lambda and contained a Log4j version vulnerable to the CVE. This has been patched to address the CVE and no evidence of exploit prior to this action was detected.

MettleCI Software Build Systems

Data Migrators have scanned the build server for MettleCI for Log4j instances, including the tools that automatically build, test and release our software. On top of any supplier-specific mitigations we have applied a whole-of-server mitigation.

System

Supplier

Supplier’s CVE Advisory

(External URL)

DM Remediation Actions

System

Supplier

Supplier’s CVE Advisory

(External URL)

DM Remediation Actions

Bitbucket Cloud

Atlassian

Link

None required. As with all SaaS tenants, we rely on the supplier’s mitigation.

Jira Cloud

Atlassian

Link

None required. As with all SaaS tenants, we rely on the supplier’s mitigation.

Bamboo

Atlassian

Link

Not exposed. Log4j 1.2.17 used but this version pre-dates the presence of the CVE-triggering feature.

SonarQube

SonarSource S.A.

Link

ElasticSearch exposed. Applied supplier’s recommended CVE mitigation.

Artifactory

Jfrog

Link

None required. No exposure to CVE.

 

© 2015-2024 Data Migrators Pty Ltd.