-
Notifications
You must be signed in to change notification settings - Fork 32
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Log4j vulnerability #964
Comments
Hi @mattecasu, Snow Owl is unaffected of this vulnerability (it uses a different logging library than log4j), but Elasticsearch as storage and search backend is somewhat vulnerable, RCE is not possible, but information leakage in certain cases yes, please refer to this site: https://xeraa.net/blog/2021_mitigate-log4j2-log4shell-elasticsearch/. All three dev streams ( The currently planned release date for Snow Owl 7.18.1 and 8.1.0 is the 21st of January. Cheers, |
Hi @mattecasu, Snow Owl 7.18.1 is out, which depends on Elasticsearch 7.16.3 and resolves any potential security vulnerability around log4j2. Cheers, |
Dear Mark, thanks for the patched tags - we are having an issue when using 7.18.1, I suspect it's not compatible with the latest AWS ElasticSearch clusters version (that is on 7.10). It seems like it cannot contact the cluster or find the indexes ("cluster not available" and also By the way: I confirmed 7.18.0 instead worked fine (which is on ES 7.10) |
Hi @mattecasu, Do you have the full stack trace? Cheers, |
Hi @cmark, here's the full stacktrace we're getting:
(I slightly redacted our Elasticsearch URL) |
Hi @aelred, Could you please try the latest Thank you, |
Thanks Mark, we'll give it a try when it's pushed up! It looks like the build failed though:
https://github.com/b2ihealthcare/snow-owl/runs/5009331342?check_suite_focus=true |
Yeah, that's the I hope this helps. Cheers, |
Oh you're right! Sorry, I was looking at the wrong thing. With the new Here's the full stack trace:
|
Hello Mark, As for log4j, one way is to:
|
Hi @mattecasu, Interesting, according to the official Elasticsearch docs, it should be backward compatible with the older 7.x versions, but apparently that's not true. Anyway, we are going to debug this and hopefully get a fix for it sometime soon, in the meantime I recommend a rollback to 7.18.0 version which is able to communicate with your ES cluster without an issue and configure the mentioned I hope this helps, if you have any questions please let us know. Cheers, |
Thanks Mark, we'll apply the configuration for now! |
Hello again Mark, did you find a way to make the patched versions compatible with AWS's ElasticSearch? Just asking to understand if you have it on the roadmap. |
Hi @mattecasu, Not yet, we could fix it by altering the Elasticsearch source somehow but that could easily turn into a licensing issue which we would like to avoid. Feel free to open another ticket that tracks the compatibility of Snow Owl with the AWS Elasticsearch service, which only fixes the client-side part of the Log4j2 vulnerability, the AWS Elasticsearch service will still offer Elasticsearch 7.10.2, which is somewhat vulnerable to information leakage attacks (but not to RCE attacks). I still recommend either switching to Elastic Cloud as Elasticsearch hosting solution or hosting the Elasticsearch service on your own. Please refer to the AWS documentation to see the supported Elasticsearch versions (up to Elasticsearch OSS 7.10). I hope this helps. Feel free to reach out to us if you have any further questions. Cheers, |
Hello dear b2i,
do you plan to release dockerised patched versions for the log4j "0-day" vulnerability [containing the latest log4j version 2.17.1, or alternatively none at all]? Or, is there a mitigation that you suggest, perhaps one of these? https://www.lunasec.io/docs/blog/log4j-zero-day-mitigation-guide .
Thank you
The text was updated successfully, but these errors were encountered: