{"id":50107,"date":"2021-12-10T17:46:45","date_gmt":"2021-12-11T00:46:45","guid":{"rendered":"https:\/\/ephesoft.com\/docs\/?post_type=docs&p=50107"},"modified":"2024-02-02T10:06:52","modified_gmt":"2024-02-02T17:06:52","slug":"log4j-vulnerability","status":"publish","type":"docs","link":"https:\/\/ephesoft.com\/docs\/products\/transact\/release-notes\/log4j-vulnerability\/","title":{"rendered":"Log4j Vulnerability"},"content":{"rendered":"

*This Knowledge Base article will be updated as more information becomes available.<\/p>\n

[Update 5\/3\/2022] In Transact 2022.1.00, log4j has been updated to version 2.17.1.
\n[Update 1\/3\/22] <\/em>CVE-2021-44832<\/em><\/a>: Apache Log4j2 is vulnerable to remote code execution (RCE) via the JDBC Appender when an attacker controls configuration. The risk associated with this vulnerability is low as JNDI source names are limited in Transact integration.
\n[Update 12\/20\/21] Apache announced the <\/em>
CVE-2021-45105<\/em><\/a> vulnerability related to the Log4j Thread Context Map (MDC). See the<\/em> CVE-2021-45105<\/em><\/a> section below for more information.<\/em>
\n[Update 12\/16\/21] Information on security scanning software added.
\n[Update 12\/15\/21] Apache announced the second vulnerability in Log4j, <\/em>
CVE-2021-45046<\/em><\/a>, that affected the JndiLookup class. Ephesoft confirmed that the original patched mitigation steps resolve this vulnerability because the patch files do not include the JndiLookup class.
\n[Update 12\/13\/21] Information on the handling of log4j-1*.jar added.
\n[Update 12\/11\/21 7:15pm PST] All Transact Cloud servers have been patched.
\n[Update 12\/11\/21 12:00pm PST] Ephesoft released patched log4j-core-2*.jar files mitigating <\/em>
CVE-2021-44228<\/em><\/a> and <\/em>CVE-2021-45046<\/em><\/a> vulnerabilities.<\/em><\/p>\n

<\/a>Issue<\/strong><\/h2>\n

On December 10th, 2021, a global and widespread critical vulnerability was discovered in Apache Log4j, an open-source Java package used to enable logging in many popular applications. This vulnerability can be exploited to allow remote code execution on servers. It affects several applications, including Ephesoft Transact.<\/p>\n

For more information about this vulnerability, please visit the Apache<\/a> website.<\/p>\n

<\/a>Mitigation Steps<\/h2>\n

Transact On-Premise users versions 4.5-2020.1.06:<\/strong><\/p>\n

To apply the patch released by Ephesoft:<\/p>\n

    \n
  1. Stop the Transact server service.<\/li>\n
  2. Locate any log4j-core-2*.jar files in the following directories and rename the JAR extension to BAK. Notate the version of the file as the same patched version. That file will need to be used in its place.\n