Log4Shell exploit
Post here questions and problems related to oXygen frameworks/document types.
-
- Posts: 9431
- Joined: Fri Jul 09, 2004 5:18 pm
Re: Log4Shell exploit
Hi Scott,
What version of the Oxygen SDK are you using?
How are you using the Oxygen SDK? If you are using it only for compilation, then the SDK itself does not run any code.
If you are using it to build an AuthorComponent Swing application you should set the system property in the command line used to start it:
If you compile various actions or Java customizations which will later run in Oxygen XML Editor/Author or on our WebAuthor or Content Fusion servers, we'll try to release new maintenance bug fix versions of each of these products with an updated logging library.
Regards,
Radu
What version of the Oxygen SDK are you using?
How are you using the Oxygen SDK? If you are using it only for compilation, then the SDK itself does not run any code.
If you are using it to build an AuthorComponent Swing application you should set the system property in the command line used to start it:
Code: Select all
-Dlog4j2.formatMsgNoLookups=true
Regards,
Radu
Radu Coravu
<oXygen/> XML Editor
http://www.oxygenxml.com
<oXygen/> XML Editor
http://www.oxygenxml.com
-
- Posts: 12
- Joined: Fri Nov 15, 2019 9:13 pm
Re: Log4Shell exploit
Post by AnalogKid82 »
We're also interested in a patch for CVE-2021-44228, if necessary. We only use the Oxygen Editor and publish to Fluid Topics, but I see there are several log4j files under the installation directory. Are we vulnerable?
-
- Posts: 269
- Joined: Sat Jul 10, 2010 4:03 pm
Re: Log4Shell exploit
Radu,
We are using version 22.0 of the SDK.
Going through the pom I saw this
<properties>
<target.web.dir>${project.build.directory}/dist</target.web.dir>
<jnlp.name>mbep</jnlp.name>
<project.build.sourceEncoding>UTF-8</project.build.sourceEncoding>
<oxygen.sdk.version>22.0.0.0</oxygen.sdk.version>
<maven.compiler.source>1.8</maven.compiler.source>
<maven.compiler.target>1.8</maven.compiler.target>
</properties>
<dependency>
<groupId>com.oxygenxml</groupId>
<artifactId>oxygen-sdk</artifactId>
<version>${oxygen.sdk.version}</version>
<exclusions>
<exclusion>
<groupId>log4j</groupId>
<artifactId>log4j</artifactId>
</exclusion>
</exclusions>
</dependency>
<dependency>
<groupId>org.apache.logging.log4j</groupId>
<artifactId>log4j-api</artifactId>
<version>2.15.0</version>
</dependency>
<dependency>
<groupId>org.apache.logging.log4j</groupId>
<artifactId>log4j-core</artifactId>
<version>2.15.0</version>
</dependency>
The log4j I see being included is Version 2.15, which is not effected?
These are the 3 log4j files in the project
/home/scott/Desktop/ide/log4j-api-2.15.0.jar
/home/scott/Desktop/ide/log4j-core-2.15.0.jar
/home/scott/Desktop/ide/oxygen-patched-log4j-22.0.0.0.jar
We are using the SDK to build a client AuthorComponent Swing application.
If we upgrade the SDK to version 24, would that prevent the exploit?
Scott
We are using version 22.0 of the SDK.
Going through the pom I saw this
<properties>
<target.web.dir>${project.build.directory}/dist</target.web.dir>
<jnlp.name>mbep</jnlp.name>
<project.build.sourceEncoding>UTF-8</project.build.sourceEncoding>
<oxygen.sdk.version>22.0.0.0</oxygen.sdk.version>
<maven.compiler.source>1.8</maven.compiler.source>
<maven.compiler.target>1.8</maven.compiler.target>
</properties>
<dependency>
<groupId>com.oxygenxml</groupId>
<artifactId>oxygen-sdk</artifactId>
<version>${oxygen.sdk.version}</version>
<exclusions>
<exclusion>
<groupId>log4j</groupId>
<artifactId>log4j</artifactId>
</exclusion>
</exclusions>
</dependency>
<dependency>
<groupId>org.apache.logging.log4j</groupId>
<artifactId>log4j-api</artifactId>
<version>2.15.0</version>
</dependency>
<dependency>
<groupId>org.apache.logging.log4j</groupId>
<artifactId>log4j-core</artifactId>
<version>2.15.0</version>
</dependency>
The log4j I see being included is Version 2.15, which is not effected?
These are the 3 log4j files in the project
/home/scott/Desktop/ide/log4j-api-2.15.0.jar
/home/scott/Desktop/ide/log4j-core-2.15.0.jar
/home/scott/Desktop/ide/oxygen-patched-log4j-22.0.0.0.jar
We are using the SDK to build a client AuthorComponent Swing application.
If we upgrade the SDK to version 24, would that prevent the exploit?
Scott
-
- Posts: 9431
- Joined: Fri Jul 09, 2004 5:18 pm
Re: Log4Shell exploit
Answer for Scott:
Oxygen 22.0 still uses Apache 1.x log4j which should not be affected by this problem. Oxygen delivers it patched "oxygen-patched-log4j-22.0.0.0.jar" to remove an older security risk.
We upgraded to Log4j 2.x in Oxygen 22.1.
Yesterday we released a new version of the 24 SDK which uses the latest Log4j 2.x libraries which remove the security threat.
Regards,
Radu
Oxygen 22.0 still uses Apache 1.x log4j which should not be affected by this problem. Oxygen delivers it patched "oxygen-patched-log4j-22.0.0.0.jar" to remove an older security risk.
We upgraded to Log4j 2.x in Oxygen 22.1.
Yesterday we released a new version of the 24 SDK which uses the latest Log4j 2.x libraries which remove the security threat.
Regards,
Radu
Radu Coravu
<oXygen/> XML Editor
http://www.oxygenxml.com
<oXygen/> XML Editor
http://www.oxygenxml.com
-
- Posts: 9431
- Joined: Fri Jul 09, 2004 5:18 pm
Re: Log4Shell exploit
Answer for AnalogKid82, about your XML Editor installation please read this article:
https://www.oxygenxml.com/oxygen_xml_vu ... s_faq.html
Yesterday we released an Oxygen 24 kit which removes the problem completely both for editing and publishing using Oxygen's bundled DITA OT engine.
We plan to do so also with Oxygen 23.1.
About you publishing through Fluid Topics you should address this question to them.
Regards,
Radu
https://www.oxygenxml.com/oxygen_xml_vu ... s_faq.html
Yesterday we released an Oxygen 24 kit which removes the problem completely both for editing and publishing using Oxygen's bundled DITA OT engine.
We plan to do so also with Oxygen 23.1.
About you publishing through Fluid Topics you should address this question to them.
Regards,
Radu
Radu Coravu
<oXygen/> XML Editor
http://www.oxygenxml.com
<oXygen/> XML Editor
http://www.oxygenxml.com
-
- Posts: 9431
- Joined: Fri Jul 09, 2004 5:18 pm
Re: Log4Shell exploit
Hi,
Indeed the Calabash engine (used by Oxygen to run XProc scripts) used log4j 2 even in older versions of Oxygen like 22.0.
If you do not use XProc scripts you could remove the entire "lib/xproc" folder completely, now if the problem is really present or not is hard to tell, we would need to know in what places in their code the Calabash engine logs messages, and also probably you would need to run a certain transformation in Oxygen to trigger the security problem, it's not a security problem that someone can cause by remote logging into Oxygen as Oxygen is a desktop application not a server, but if someone who does not have good intentions would tell you to open in Oxygen a certain XProc script and then run it, and you would follow their advice it may be a possibility to trigger this security problem.
Regards,
Radu
Indeed the Calabash engine (used by Oxygen to run XProc scripts) used log4j 2 even in older versions of Oxygen like 22.0.
If you do not use XProc scripts you could remove the entire "lib/xproc" folder completely, now if the problem is really present or not is hard to tell, we would need to know in what places in their code the Calabash engine logs messages, and also probably you would need to run a certain transformation in Oxygen to trigger the security problem, it's not a security problem that someone can cause by remote logging into Oxygen as Oxygen is a desktop application not a server, but if someone who does not have good intentions would tell you to open in Oxygen a certain XProc script and then run it, and you would follow their advice it may be a possibility to trigger this security problem.
Regards,
Radu
Radu Coravu
<oXygen/> XML Editor
http://www.oxygenxml.com
<oXygen/> XML Editor
http://www.oxygenxml.com
-
- Posts: 12
- Joined: Fri Nov 15, 2019 9:13 pm
Re: Log4Shell exploit
Post by AnalogKid82 »
We just updated to the latest Oxygen 24 build and we are in communication with Antidot. Thanks for the quick response!Radu wrote: ↑Tue Dec 14, 2021 8:08 am Answer for AnalogKid82, about your XML Editor installation please read this article:
https://www.oxygenxml.com/oxygen_xml_vu ... s_faq.html
Yesterday we released an Oxygen 24 kit which removes the problem completely both for editing and publishing using Oxygen's bundled DITA OT engine.
We plan to do so also with Oxygen 23.1.
About you publishing through Fluid Topics you should address this question to them.
Regards,
Radu
-
- Posts: 269
- Joined: Sat Jul 10, 2010 4:03 pm
Re: Log4Shell exploit
Yesterday Apache released another fix for another RCE exploit.
Previously exploit CVE-2021-44228 was addressed in log4j-2.15.
Now exploit CVE-2021-45046 is being addressed in log4j-2.16.
Does SDK version 24.0.0.1 use the 2.15 or the 2.16 version of log4j?
Scott
Previously exploit CVE-2021-44228 was addressed in log4j-2.15.
Now exploit CVE-2021-45046 is being addressed in log4j-2.16.
Does SDK version 24.0.0.1 use the 2.15 or the 2.16 version of log4j?
Scott
-
- Posts: 9431
- Joined: Fri Jul 09, 2004 5:18 pm
Re: Log4Shell exploit
Hi Scott,
The 24.0.0.1 SDK uses Lg4j 2.15, we'll probably release a new SDK and Oxygen 24.0 these days (today or tomorrow) with Log4j 2.16. Of course there is nothing stopping you to override the logging libraries bundled with the SDK and use Log4j 2.16 on your side.
Also the new vulnerability for which they issued 2.16:
https://nvd.nist.gov/vuln/detail/CVE-2021-45046
has a low security score and could occur only when the end user is using a configuration file with a certain non-standard pattern layout.
Regards,
Radu
The 24.0.0.1 SDK uses Lg4j 2.15, we'll probably release a new SDK and Oxygen 24.0 these days (today or tomorrow) with Log4j 2.16. Of course there is nothing stopping you to override the logging libraries bundled with the SDK and use Log4j 2.16 on your side.
Also the new vulnerability for which they issued 2.16:
https://nvd.nist.gov/vuln/detail/CVE-2021-45046
has a low security score and could occur only when the end user is using a configuration file with a certain non-standard pattern layout.
Regards,
Radu
Radu Coravu
<oXygen/> XML Editor
http://www.oxygenxml.com
<oXygen/> XML Editor
http://www.oxygenxml.com
-
- Posts: 2
- Joined: Thu Dec 16, 2021 12:35 pm
Re: Log4Shell exploit
Hi Radu,
I just downloaded the latest oXygen Developer and ClamXav on my MBP reports a few infections:
dita.jar Java.Exploit.CVE_2021_44228-9914600-2 Fout /Volumes/Oxygen XML Developer 24.0 1/Oxygen XML Developer/frameworks/dita/dita.jar
There are other jars which are reported, f.i.:
oxygen-editor-variables-parser.jar Java.Exploit.CVE_2021_44228-9914601-4 Fout /Volumes/Oxygen XML Developer 24.0 1/Oxygen XML Developer/lib/oxygen-editor-variables-parser.jar
with another exploit-code (...-4 instead of ...-2).
Are these valid reports or is ClamXav at fault here?
Regards,
Huib.
I just downloaded the latest oXygen Developer and ClamXav on my MBP reports a few infections:
dita.jar Java.Exploit.CVE_2021_44228-9914600-2 Fout /Volumes/Oxygen XML Developer 24.0 1/Oxygen XML Developer/frameworks/dita/dita.jar
There are other jars which are reported, f.i.:
oxygen-editor-variables-parser.jar Java.Exploit.CVE_2021_44228-9914601-4 Fout /Volumes/Oxygen XML Developer 24.0 1/Oxygen XML Developer/lib/oxygen-editor-variables-parser.jar
with another exploit-code (...-4 instead of ...-2).
Are these valid reports or is ClamXav at fault here?
Regards,
Huib.
-
- Posts: 9431
- Joined: Fri Jul 09, 2004 5:18 pm
Re: Log4Shell exploit
Hi,
Those look like some kind false positives, maybe you can ask the ClamXav tool vendors for more details.
That "CVE_2021_44228-9914601" possibly refers to the same log4j problem: https://nvd.nist.gov/vuln/detail/CVE-2021-44228
but for example the "dita.jar" from the DITA OT engine does not use the Log4j libraries at all, it uses the LogBack libraries.
Also the problem should be detected inside the logging libraries not inside libraries which might use the logging libraries.
Regards,
Radu
Those look like some kind false positives, maybe you can ask the ClamXav tool vendors for more details.
That "CVE_2021_44228-9914601" possibly refers to the same log4j problem: https://nvd.nist.gov/vuln/detail/CVE-2021-44228
but for example the "dita.jar" from the DITA OT engine does not use the Log4j libraries at all, it uses the LogBack libraries.
Also the problem should be detected inside the logging libraries not inside libraries which might use the logging libraries.
Regards,
Radu
Radu Coravu
<oXygen/> XML Editor
http://www.oxygenxml.com
<oXygen/> XML Editor
http://www.oxygenxml.com
-
- Posts: 9431
- Joined: Fri Jul 09, 2004 5:18 pm
Re: Log4Shell exploit
In parallel I asked our sys admin to scan the Oxygen 24.0 all platforms kit from our web site, he scanned with this version:
and it did not seem to report anything:
Regards,
Radu
Code: Select all
clamscan --version
ClamAV 0.103.2/26389/Thu Dec 16 06:02:49 2021
Code: Select all
----------- SCAN SUMMARY -----------
Known viruses: 8583548
Engine version: 0.103.2
Scanned directories: 1513
Scanned files: 12507
Infected files: 0
Data scanned: 1210.11 MB
Data read: 493.10 MB (ratio 2.45:1)
Time: 540.801 sec (9 m 0 s)
Start Date: 2021:12:16 11:27:06
End Date: 2021:12:16 11:36:07
Radu
Radu Coravu
<oXygen/> XML Editor
http://www.oxygenxml.com
<oXygen/> XML Editor
http://www.oxygenxml.com
-
- Posts: 2879
- Joined: Tue May 17, 2005 4:01 pm
Re: Log4Shell exploit
Hi,
ClamAV seems to have dropped today the signature for Java.Exploit.CVE_2021_44228-9914601-4. See here:
https://lists.clamav.net/pipermail/clam ... 07774.html
Not sure about Java.Exploit.CVE_2021_44228-9914600-2, but it might also generate false positives.
Either way, update your AV signatures/database and try to scan again.
Regards,
Adrian
ClamAV seems to have dropped today the signature for Java.Exploit.CVE_2021_44228-9914601-4. See here:
https://lists.clamav.net/pipermail/clam ... 07774.html
Not sure about Java.Exploit.CVE_2021_44228-9914600-2, but it might also generate false positives.
Either way, update your AV signatures/database and try to scan again.
Regards,
Adrian
Adrian Buza
<oXygen/> XML Editor, Schema Editor and XSLT Editor/Debugger
http://www.oxygenxml.com
<oXygen/> XML Editor, Schema Editor and XSLT Editor/Debugger
http://www.oxygenxml.com
-
- Posts: 269
- Joined: Sat Jul 10, 2010 4:03 pm
Re: Log4Shell exploit
Radu,
This issue is like herding cats. I saw that CVE-2021-45046 required a non standard pattern, but I know the powers above want an iron clad solution. Thanks for all the work you guys do...
Scott
This issue is like herding cats. I saw that CVE-2021-45046 required a non standard pattern, but I know the powers above want an iron clad solution. Thanks for all the work you guys do...
Scott
Radu wrote: ↑Thu Dec 16, 2021 9:12 am Hi Scott,
The 24.0.0.1 SDK uses Lg4j 2.15, we'll probably release a new SDK and Oxygen 24.0 these days (today or tomorrow) with Log4j 2.16. Of course there is nothing stopping you to override the logging libraries bundled with the SDK and use Log4j 2.16 on your side.
Also the new vulnerability for which they issued 2.16:
https://nvd.nist.gov/vuln/detail/CVE-2021-45046
has a low security score and could occur only when the end user is using a configuration file with a certain non-standard pattern layout.
Regards,
Radu
Return to “SDK-API, Frameworks - Document Types”
Jump to
- Oxygen XML Editor/Author/Developer
- ↳ Feature Request
- ↳ Common Problems
- ↳ DITA (Editing and Publishing DITA Content)
- ↳ SDK-API, Frameworks - Document Types
- ↳ DocBook
- ↳ TEI
- ↳ XHTML
- ↳ Other Issues
- Oxygen XML Web Author
- ↳ Feature Request
- ↳ Common Problems
- Oxygen Content Fusion
- ↳ Feature Request
- ↳ Common Problems
- Oxygen JSON Editor
- ↳ Feature Request
- ↳ Common Problems
- Oxygen PDF Chemistry
- ↳ Feature Request
- ↳ Common Problems
- Oxygen Feedback
- ↳ Feature Request
- ↳ Common Problems
- Oxygen XML WebHelp
- ↳ Feature Request
- ↳ Common Problems
- XML
- ↳ General XML Questions
- ↳ XSLT and FOP
- ↳ XML Schemas
- ↳ XQuery
- NVDL
- ↳ General NVDL Issues
- ↳ oNVDL Related Issues
- XML Services Market
- ↳ Offer a Service