Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Log4Shell Exploit #154

Closed
6 tasks done
syphax-bouazzouni opened this issue Dec 14, 2021 · 0 comments
Closed
6 tasks done

Log4Shell Exploit #154

syphax-bouazzouni opened this issue Dec 14, 2021 · 0 comments
Labels

Comments

@syphax-bouazzouni
Copy link
Contributor

syphax-bouazzouni commented Dec 14, 2021

There is a new zero day exploit. While I do not know if it affects any Ontoportal instance it might be good to check your Ontoportal instance and other services you might have. More info here : GHSA-jfh8-c2jp-5v3q

To follow ncbo/virtual_appliance#27

Hotfix

Disable log4j in the java options (tomporary)

OntoPortal has two components that utilize log4j so in order to mitigate this vulnerability we recommend setting JVM property ?log4j2.formatMsgNoLookups=true? at this time.

  1. Solr
    Modify solr config file /etc/sysconfig/solr and add the following:
    SOLR_OPTS="${SOLR_OPTS} -Dlog4j2.formatMsgNoLookups=true?

  2. Tomcat which runs AnnotatorPlus and BIoMixer
    Modify /etc/tomcat/tomcat.conf file and add the following:
    JAVA_OPTS="-Dlog4j2.formatMsgNoLookups=true"
    Then restart tomcat and solr services:
    sudo systemctl restart tomcat
    sudo systemctl restart solr

State

  • Done on agroportal
  • Done on stageportal
  • Done on sifrportal

Update log4j versions dependecies

Updating solr

formatMsgNoLookups=true flag might not be sufficient to fully mitigate Log4J CVE-2021-44228 so solr needs to be upgrade to recently released v8.11.1.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant