10 Dec 2021 11:20 AM - edited 10 Dec 2021 12:10 PM
Today a high severity zero day vulnerability impacting the very popular log4j package has been published:
https://www.randori.com/blog/cve-2021-44228/
https://www.lunasec.io/docs/blog/log4j-zero-day/
I would be interested to know if any Dynatrace components are known to be affected and if so, how exactly, what's the risk of compromise and if there is anything that can be done from a user/customer perspective to help minimize the risk of exploits.
I've already approached support but haven't received any response yet.
Any feedback is appreciated.
Solved! Go to Solution.
10 Dec 2021 12:07 PM
My own digging on our managed cluster nodes (1.226) has revealed this:
$ ls -l /opt/dynatrace-managed/elasticsearch/lib | grep log4j
-rw-r--r--. 1 dynatrace dynatrace 264060 May 11 2020 log4j-api-2.11.1.jar
-rw-r--r--. 1 dynatrace dynatrace 1607947 May 11 2020 log4j-core-2.11.1.jar
So it seems the bundled ES component might be affected...
11 Dec 2021 04:12 PM
If the sha256 hash is the one below, it most certainly is:
d4485176aea67cc85f5ccc45bb66166f8bfc715ae4a695f0d870a1f8d848cc3d log4j-core-2.11.1.jar
Source: https://github.com/mubix/CVE-2021-44228-Log4Shell-Hashes/blob/main/sha256sums.txt
10 Dec 2021 04:39 PM
Hi Enrico,
Our team is aware and actively investigating this issue. We've released the following statement:
Dynatrace is currently investigating potential exposure of the Log4Shell (CVE-2021-44228) vulnerability. Dynatrace is treating this as a critical vulnerability and follows its incident response procedures. In case Dynatrace identifies an exposure of this vulnerability to our customers, we are going to proactively inform affected customers within the next 72 hours.
10 Dec 2021 08:48 PM
Thanks @Enrico_F . Waiting on confirmation for SaaS Customers. I'll post any news we get.
10 Dec 2021 09:16 PM
Hi,
is it possible to use Dynatrace to find all servers/services that use log4j?
10 Dec 2021 09:40 PM
We found that only Synthetic use it. So if you have an activegate with synthetics on it will have Log4J.
11 Dec 2021 03:48 PM
The new Application Security offering should be able to point this out in your applications.
11 Dec 2021 10:18 PM - edited 11 Dec 2021 10:18 PM
Yes, it does.
11 Dec 2021 03:04 AM
we are using Activegate for our Synthetic Monitoring , will our Activegate and other systems were also get impacted and also we are using SaaS tenant.
11 Dec 2021 05:28 AM
Hi All,
Does anyone have any updates on this?
Synthetics have log4j2, but what I can't tell is the version that it is running. -- anyone else ?
Would be good to know what Active Gate versions are affected..
11 Dec 2021 03:57 PM - edited 11 Dec 2021 04:01 PM
I have not confirmed, yes or no, that Synthetic Activegates are affected.
But looking at the description of the vulnerability, it will only happen if an attacker can inject some malicious code in synthetic measurements being done. I would say that most of the private synthetic use cases that I can imagine are not easily attackable.
For anyone involved, probably one of the best security measures would be cancelling LDAP traffic, or other JNDI related endpoints, out of the organization, in firewalls. Well, that should be something in place by default. It doesn't protect though against internal attackers. There are other mitigations possible, as referenced in https://logging.apache.org/log4j/2.x/security.html
11 Dec 2021 08:21 PM
We have been scanned multiple times from different clients. There are also multiple log4j components in dynatrace managed.
Would be nice to get some feed back one whether the different important flags are set, and whether DT Managed is vulnerable.
11 Dec 2021 08:37 PM
Dear valued customer,
We want to inform you that in response to the recently published vulnerability of log4j (CVE-2021-44228) the Dynatrace team has rigorously reviewed any potential exposure and risks arising from the vulnerability.
We have updated all components of our cloud services where a risk could not be ruled out and our cloud services are currently not exposed to the vulnerability. We have equally ruled out any potential risk for the Dynatrace Managed cluster and OneAgent.
While investigations are still ongoing, we have, out of an abundance of caution, provided updates for the Synthetic Chromium component (used only in ActiveGates running Private Synthetic tests) with an updated version of log4j which is not affected by this vulnerability.
By default, this upgrade is applied automatically. In case the auto update functionality for ActiveGates has been disabled, we recommend customers manually trigger the upgrade. The following Synthetic Chromium versions use the updated log4j version:
What do I do if I have questions?
If you have any questions, please reach out to us using our in-product assistance from within your Dynatrace environment or open a Ticket in our Support-Portal.
Sincerely,
Dynatrace ONE
11 Dec 2021 08:41 PM
Where did you get this? I have not gotten this.
11 Dec 2021 09:06 PM
Hey Tarjei, Dynatrace targeted this message to customers which actively use Private Synthetic locations. Let me know if there is anything else I can help you with.
11 Dec 2021 09:09 PM
We use and manage private synthetic for at least 10 different customers, so I find it a bit strange that this has not reached us?
11 Dec 2021 09:30 PM
Hey Tarjei, can you confirm that you are signed up as an "emergency contact" for these clusters as documented here?
https://www.dynatrace.com/support/help/how-to-use-dynatrace/user-management-and-sso/configure-emerge...
11 Dec 2021 10:14 PM
Hi Stefan. I can confirm that I'm emergency contact on one of our clusters and no email has been received.
/Thomas
13 Dec 2021 07:20 AM
We are actively using several synthetic private locations but so far none of our emergency contacts have received this message, either.
In our case auto-update for our ActiveGates is turned off but it seems the "Synthetic" module has already been updated automatically without our intervention regardless:
Perhaps that explains why we didn't receive any info?
13 Dec 2021 03:06 AM - edited 13 Dec 2021 03:11 AM
Hi Team,
Thanks for the answer.
The updated version of log4j is 2.15. Right?
Regards
13 Dec 2021 08:19 AM
Hello @anton_goosen
Our security team is complaining about the following:
The cluster version: 1.228.128.20211118-160244
Regards,
Babar
13 Dec 2021 12:03 PM
We are also worried about these.
Would be nice with:
- Are these vulnerable?
- When will log4j be updated on these components?
11 Dec 2021 08:43 PM
Hi, Could someone confirm whether any other component than Synthetic monitoring/Synthetic enabled with Activegate is also impacted because of this issue? Our security team is concerned about ongoing vulnerability. Appreciate if someone from Dynatrace confirm whether Dynatrace SaaS and/or Dynatrace Managed are impacted. Thanks, Suresh.
11 Dec 2021 10:16 PM
Hi Suresh,
Anton has mentioned the other components are not affected:
"We have updated all components of our cloud services where a risk could not be ruled out and our cloud services are currently not exposed to the vulnerability. We have equally ruled out any potential risk for the Dynatrace Managed cluster and OneAgent."
Will that help your security team?
If they have any more questions, I'd recommend to use the in-product chat or contacting Support.
11 Dec 2021 10:32 PM
Thanks for the update @ben_wrightson and @anton_goosen your latest updates puts our team in a comfortable spot ATM 😊 But, please post further updates on this incident as soon as you have. Have a nice weekend!
13 Dec 2021 08:20 AM
Yesterday, Dynatrace has also published a blog post on this vulnerability: https://www.dynatrace.com/news/blog/log4j-vulnerability-identifying-and-minimizing-production-risk/
13 Dec 2021 09:35 AM
HI.
elasticsearch has log4j 2.11.
And log4j is loaded in the process.
Restart the service by adding -Dlog4j2.formatMsgNoLookups=true to jvm.options in elasticsearch/config.
13 Dec 2021 09:50 AM
@anton_goosen or someone from Dynatrace - can you please comment on elasticsearch running on Managed cluster nodes? This appears to conflict the earlier statement "We have equally ruled out any potential risk for the Dynatrace Managed cluster and OneAgent."
13 Dec 2021 12:45 PM
My Managed server version is 1.230.120.
And built-in elasticsearch version is 7.10.0.
JVM version : 1.8.0_292
Elasticsearch says "Elasticsearch running on JDK8 or below is susceptible to an information leak via DNS which is fixable by the JVM property identified below. The JVM option identified below is effective for Elasticsearch versions 5.5+, 6.5+, and 7+. Soon we will make available Elasticsearch 6.8.21 and 7.16.1 which will set the JVM option identified below and remove the vulnerable Log4j component out of an abundance of caution."
13 Dec 2021 01:09 PM
Hi Chki
Our security team is still assessing the impact if that Elastic search version. If you are concerned, I can confirm that the Mitigation step (setting the JVM option) that is suggested in your post is safe to use on the DT Elastic server. We will update everyone as soon as we have confirmation.
Anton
13 Dec 2021 01:39 PM
Great, is there a broader communication being prepared for all customers?
13 Dec 2021 12:05 PM
HI @Kalle,
According to https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-es..., what I can confirm is Elasticsearch is not susceptible to remote code execution with this vulnerability due to the use of the Java Security Manager.
13 Dec 2021 02:39 PM
Hi Nada,
How to check that we use Java Security Manager or is already activated by the module ?
13 Dec 2021 03:42 PM - edited 13 Dec 2021 03:43 PM
Is the DynaTrace Android Mobile App impacted??
13 Dec 2021 03:51 PM
Hi all,
We are not installing active gate
It does it mean we are not using this module and we are not impacted by the vulnearbility so we can remove the jar file ?
13 Dec 2021 05:03 PM - edited 14 Dec 2021 06:59 AM
If you are referring to the jar file on cluster hosts, then this is not related to the ActiveGate Synthetic Module. The jar file on the cluster hosts belongs to ElasticSearch. According to https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-es There are the versions listed which are affected. The content was update for new version information: "[...]Supported versions of Elasticsearch (6.8.9+, 7.8+) used with recent versions of the JDK (JDK9+) are not susceptible to either remote code execution or information leakage. This is due to Elasticsearch’s usage of the Java Security Manager. [...]". To check your ElasticSearch version you could use: curl -XGET 'http://localhost:9200' on a cluster node.
14 Dec 2021 06:05 PM
Hi Team, I am seeing log4j 2.15 is also discredited. So, may I know what Dynatrace team suggesting now?
Please see this page https://github.com/apache/logging-log4j2/blob/release-2.x/src/site/markdown/security.md#history
Older (discredited) mitigation measures
This page previously mentioned other mitigation measures, but we discovered that these measures only limit exposure while leaving some attack vectors open.
The 2.15.0 release was found to still be vulnerable when the configuration has a pattern layout containing a Context Lookup (for example, $${ctx:loginId}), or a Thread Context Map pattern %X, %mdc or %MDC. When an attacker can control Thread Context values, they may inject a JNDI Lookup pattern, which will be evaluated and result in a JNDI connection. Log4j 2.15.0 restricts JNDI connections to localhost by default, but this may still result in DOS (Denial of Service) attacks, or worse.
Other insufficient mitigation measures are: setting system property log4j2.formatMsgNoLookups or environment variable LOG4J_FORMAT_MSG_NO_LOOKUPS to true for releases >= 2.10, or modifying the logging configuration to disable message lookups with %m{nolookups}, %msg{nolookups} or %message{nolookups} for releases >= 2.7 and <= 2.14.1.
The reason these measures are insufficient is that, in addition to the Thread Context attack vector mentioned above, there are still code paths in Log4j where message lookups could occur: known examples are applications that use Logger.printf("%s", userInput), or applications that use a custom message factory, where the resulting messages do not implement StringBuilderFormattable. There may be other attack vectors.
The safest thing to do is to upgrade Log4j to a safe version, or remove the JndiLookup class from the log4j-core jar.
14 Dec 2021 07:12 PM
Hi Suresh
Our security team are closely monitoring the situation and are working to mitigate any issues as we find them. If you have any questions, please reach out to us via Chat or a Support Ticket
Kind Regards
Anton
15 Dec 2021 12:37 PM
Fixed versions of Dynatrace mentioned in official communication:
1.230.127.20211213-130244, 1.228.131.20211213-130253, 1.226.128.20211213-130354
contains same elastic/log4j versions as nonfixed, but with added elastic jvm parameter "-Dlog4j2.formatMsgNoLookups=true".
15 Dec 2021 03:18 PM
Hey DnyaMight Pro
This of course is impacting our Managed Cluster Nodes! We're currently on version 1.230.127.20211213-130244. Our infosec team would like know if the lower lo4j (2.11) can be removed without causing any impact as our scans will continue to highlight these libraries..
Can the log4j be upgraded? If so, what are the steps?
15 Dec 2021 07:15 PM
Dear valued customers,
we would like to inform you that Dynatrace just published a website summarizing the current state and findings in regards to the current log4j situation. You can find the article here:
https://www.dynatrace.com/news/security-alert/log4shell-log4j-vulnerability/
Dynatrace expects to update this document as new information becomes available.
15 Dec 2021 07:55 PM - edited 15 Dec 2021 07:57 PM
As all official communication about this topic will be done from now on through the article Stefan posted, Dynatrace chat and support tickets, I'm closing this thread for now - as soon as I will get a green light again, it will be reopened (hopefully pretty shortly 🙂)
24 Jan 2022 01:45 PM - last edited on 25 Jan 2022 02:03 PM by MaciejNeumann
To learn more about how the Log4Shell vulnerability itself works and how to mitigate it, check out the following resources: