Copy link to clipboard
Copied
Does anyone know if the zero-day exploit affecting the popular Apache Log4j utility (CVE-2021-44228) that was announced on 12/9/2021 will affect ColdFusion version 10 and 2018?
Hi Everyone,
We had originally published (on Dec 14) some workaround/mitigation steps in this article until the patch would be released. Since then, there have been updates and still further updates.
Dec 14: Technote with initial mitigations offered:
https://helpx.adobe.com/coldfusion/kb/log4j-vulnerability-coldfusion.html
Update Dec 17: Updates for CF2021 and 2018 were released, addressing this log4j vulnerability. The technote mentioned above was a preliminary response, offered on Dec 14.
...Copy link to clipboard
Copied
Never mind my comment. I was confused.
Copy link to clipboard
Copied
What if we are only at update 10 on CF2018 and have log4j ver 2.9.0. Will updating to 2.15.0 causes issues without being on update 11 or 12? I know we need to apply the updates and it is in the works, but have to go thru change request and other steps with different support teams before we can just apply updates. TIA
Copy link to clipboard
Copied
You can do as described earlier and replace 2.9.0 with 2.15.0.
I tested locally on an update 10, and logs seem to work as expected.
Of course, I can not guaratntee this is not going to affect your particular instance.
You will need to test on your own test environments before deploying this fix to production.
Copy link to clipboard
Copied
So after careful checking I grabbed one of the wrong jar files and that was causing the issue.
The three links listed above all work and will give you correct jars to resolve issue.
Process:
1. Stop CF service
2. Paste in 3 new Jar files to \ColdFusion2018\cfusion\lib
3. Remove 3 old jar files from Lib folder \ColdFusion2018\cfusion\lib
4. Update the log4j.properities files changing m% to %m{nolookups} in the same lib folder
5. Update JVM config to include -Dlog4j2.formatMsgNoLookups=true in the arguments
6. Start CF and you are good to go!
Thanks all for the help, you are awesome!
Copy link to clipboard
Copied
This is exactly the same situation we are in, we had CF2018 update 10 live. Will look to apply to update 12, but need to make sure there are no breaking changes first. But, your use case is exactly the same as ours when we patched on Friday night.
Copy link to clipboard
Copied
Thanks NicoTexas and jstratton77. I am in the process of doing this in our DEV environment now and then will have to test some apps and check log files to make sure everything is ok. Good to know someone else already went this route. I assume not issues cropped up on you at this point?
Copy link to clipboard
Copied
Nope, no issues at all. Today would have been our first heavy day since applying on Friday night.
Copy link to clipboard
Copied
FYI this morning I attempted an update from Update 10 to 12 and had a failure which resulted in 403 errors that despite following all the troubleshooting steps online we were unable to recover from and required a restore from a VM backup to get back to level 10 we have since just gone with the library update.
We are on an IIS server with Coldfusion and have run the lock down. I am not sure if you will have the same issue of course
Copy link to clipboard
Copied
T.Brown,
Those that ran the lockdown tool appear to have this problem. Disappointing that Adobe has not fixed it or put this info prominently on the update page. It's a simple fix if you only know about it!
403 Permission Error with Tomcat
Once you apply the hotfix, make sure to re-create the connector. Becase there is a new property added after update 7. In case, it is not matching the secret key, it will throw 403 error.
If you have already done the connector and still getting the error, then check the server.xml(\ColdFusion2018\{instance}\runtime\conf) and then search for "secret". In the same line if you have both "secret" and "requiredsecret", please remove the requiredsecret entry and restart the server. It will fix the issue.
Copy link to clipboard
Copied
Yeah so we tried this and what occured was that instead of getting the 403 error IIS started returning the actual coldfusion code on the page instead of the HTML. That really scared the person working on the issue with me 🙂
In the end we had a backupfrom 9pm the night before and nothing else had changed on the page to so we went that and will plan the update going forward
Copy link to clipboard
Copied
I have also noticed that there is a 1.2.17 log4j instance in the jetty folder (ColdFusion20XX\cfusion\jetty\lib\ext). Has anyone done anything to mitigate this?
Copy link to clipboard
Copied
There is also a log4j-1.2.15.jar in the instance/lib directory that was not deleted once the log4j files went to 2.x in later releases. I have contacted Adobe asking if upgrading to 2.15.0 we are safe and are not voiding our warranty on the software. I was told that Adobe security is still analysing the impact and they will make official announcement.
Copy link to clipboard
Copied
per apache these versions are not vulnerable: Versions Affected: all log4j-core versions between 2.0-beta9 and 2.14.1
Copy link to clipboard
Copied
While that is technically true it may not be the case, and remains unclear as I have not seen any official word on if it is impacted or not:
See this: Log4j – Apache Log4j Security Vulnerabilities
In particular:
Please note that Log4j 1.x has reached end of life and is no longer supported. Vulnerabilities reported after August 2015 against Log4j 1.x were not checked and will not be fixed.
Copy link to clipboard
Copied
That's a good point. Why is there both versions in the classpath, this is not great and hard to justify.
Would love to understand what is actually used by the the default loggers. Also, why it takes so long to understand the possible impact?
Copy link to clipboard
Copied
My concern was that the log4j files include the 1.x file and it was not removed when the hotfix installed the 2.x files. This is our list of files after HF 10 was applied.
Copy link to clipboard
Copied
@Ripley Casdorph When it comes to "4. Update the log4j.properities files changing m% to %m{nolookups} in the same lib folder" please elaborate...
In my log4j.properities I see a number of ConversionPattern values like...
%d{MM/dd HH:mm:ss} [%t] %-5p %m%n
This should be updated to read...
%d{MM/dd HH:mm:ss} [%t] %-5p %m{nolookups}%n
Correct?
Copy link to clipboard
Copied
In our properties file I see 8 places to update %m.
Most now look like this:
Copy link to clipboard
Copied
Version 2.16 of log4j has been released:
https://repo1.maven.org/maven2/org/apache/logging/log4j/log4j-api/2.16.0/log4j-api-2.16.0.jar
https://repo1.maven.org/maven2/org/apache/logging/log4j/log4j-core/2.16.0/log4j-core-2.16.0.jar
Changes: https://logging.apache.org/log4j/2.x/changes-report.html#a2.16.0
Copy link to clipboard
Copied
Looking at the release notes, it turns off JNDI and requires log4j2.enableJndi to be set to true to allow it and turns off support for message lookups.
Copy link to clipboard
Copied
Has anybody been able to reproduce a POC of this issue on Coldfusion?
Copy link to clipboard
Copied
I have seen discussion from several people that they have been unable to prove CF can actually be compromised with this hack, but that doesn't mean you shouldn't patch it anyway.
The steps for fix are easy, take about 5 minutes total, and a simple restart of CF service allows for 40 seconds of down-time.
No reason not to fix for the peace of mind.
Copy link to clipboard
Copied
Hi all,
we contacted Adobe Product Security and Incident Response and received this reply:
Adobe is investigating potential impact and taking action, including updating affected systems to the latest versions of Apache log4j 2 recommended by the Apache Software Foundation.
The investigation is ongoing but, to date, Adobe has discovered no indication to suggest customer data has been impacted as a result of this issue.
ColdFusion plans to release a patch (version(s) 2021 & 2018) for this log4j vulnerability to customers on 12/17/2021.
In the meantime, we recommend ColdFusion customers apply the following workarounds/mitigations steps until this patch has been released:
Workaround/Mitigation steps:
CF2021:
CF 2021 ships with log4j 2.13.3 and 1.2 versions. The former is impacted by this vulnerability while the latter is not.
Steps:
5. Start the Instance
6. Repeat this for all the instances.
CF2018:
CF 2018 ships with log4j 2.13.3 and/or 2.9.0, and log4j 1.2. The former is impacted by this vulnerability while the latter (i.e., v1.2) is not impacted.
Steps:
8. Start the Instance
9. You can now delete log4j-core-2.9.0.jar from the temporary location
10. Repeat this for all the instances.
PMT 2021:
PMT 2021 ships with log4j 2.11.1 and log4j 2.3. Both versions are impacted.
Steps:
PMT 2018:
PMT 2018 ships with log4j 2.9.1 and log4j 2.3. Both versions are impacted.
Steps:
APIM 2021 and APIM 2018:
APIM 2021 and 2018 ship with log4j 2.3. This version is impacted.
Steps:
Note – For more information, we recommend users to refer to the below post made by Pete Freitag on the log4j issue:
Copy link to clipboard
Copied
So I am curious if this is functionally any different than doing the 2.15.0 replacement, is there anything about 2.15.0 that could cause issues? I have been running 2.15.0 now for about 12 hours and no issues have occured as far as I can tell.
Copy link to clipboard
Copied
My theory (and it's only a theory) that the 2.15.0 update accomplishs the same thing. However if you are adobe it was quicker to push through a small patch to the exisiting libaray rather then to have to run regressions and unit tests on the new library version. So there reamins a small risk doing the library update that you may find some issue that wasn't present in the older