Q2 is aware of the recent, publicly disclosed security issue relating to the Log4j security risk and we are closely following the new resolution recommendations.


 CVE-2021-45105Denial of Service
SeverityHigh
Version AffectedAll versions from 2.0-alpha7 to 2.17.0, excluding 2.3.2 and 2.12.4
DescriptionApache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack where an attacker with permission to modify the logging configuration file can construct a malicious configuration using a JDBC Appender with a data source referencing a JNDI URI which can execute remote code. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.
Mitigation

Log4j 1.x mitigation

Log4j 1.x is not impacted by this vulnerability.

Log4j 2.x mitigation

Upgrade to Log4j 2.3.1 (for Java 6), 2.12.3 (for Java 7), or 2.17.0 (for Java 8 and later).

Alternatively, this infinite recursion issue can be mitigated in configuration:

  • In PatternLayout in the logging configuration, replace Context Lookups like ${ctx:loginId} or $${ctx:loginId} with Thread Context Map patterns (%X, %mdc, or %MDC).
  • Otherwise, in the configuration, remove references to Context Lookups like ${ctx:loginId} or $${ctx:loginId} where they originate from sources external to the application such as HTTP headers or user input.

Note that only the log4j-core JAR file is impacted by this vulnerability. Applications using only the log4j-api JAR file without the log4j-core JAR file are not impacted by this vulnerability.

Also note that Apache Log4j is the only Logging Services subproject affected by this vulnerability. Other projects like Log4net and Log4cxx are not impacted by this.


We are currently analyzing and mapping entire Actimize applications installed on Customer premise:

Product
Product Version
Uses Log4j 2.x?
Note
Actimize - ActOne6.2 - 6.5YesPotentially uses of log4j version 2.13.2 in four places  
  1. Commad Line Utilities 
  2. ActOne Installer 
  3. Remote Client Java Library 
  4. Application WAR

Detailed information, please refer to attached document in this article

Actimize - ActOne6.0-6.1NoNot Applicable, no action required
Actimize - RCM5.13,14YesAll released versions of the RCM 5.x application WAR itself does not use a vulnerable version of log4j. However, if you have already installed Service Packs, it is likely that several add-on components and utilities do use a vulnerable log4j version.
RCM uses log4j 2.x at 2 places:
  1. CLI utilities
  2. Remote client

Detailed information, please refer to attached document in this article

Actimize - RCM5.12 and belowNoNot Applicable, no action required
Actimize - AIS All VersionsNoNot Applicable, no action required
Actimize - UDMAll VersionsNoNot Applicable, no action required
Actimize - IFM4.15, 4.11 and below and 10.0NoNot Applicable, no action required
Actimize - IFM 10.1,10.2YesUses log4j 2.13 at 3 places:
  1. Runtime plugins (FF_plugins)
  2. Profiles Verification Utility (used for testing and verification only)
  3. Installer Components (used during installation and upgrades only)

Detailed information, please refer to attached document in this article

Actimize - IFM Remote Banking3.1NoNot Applicable, no action required
Actimize - SAMAll Versions YesUses log4j 2.x at 4 places:
  1. Installer infrastructure library
  2. Gem library
  3. SAM RCM Plugin
  4. SAM Java Solutions

Detailed information, please refer to attached document in this article

Actimize - CDD All VersionsYesUses log4j 2.x at 3 places:
  1. Installer infrastructure library
  2. Gem library
  3. CDD Java Solutions
Detailed information, please refer to attached document in this article
Actimize - WLF All VersionsNoNot Applicable, no action required


In case you're using above Actimize solution's version, please check at mentioned places and verify if you have log4j 2.x installed in your environment. Once you confirmed, please contact Q2 Support for further assistance. 



NOTE:

This page will be updated regularly in case any update to this vulnerability.


Reference:

  1. https://niceprod.service-now.com/csm?id=log4j_security_vulnerability  
  2. https://logging.apache.org/log4j/2.x/security.html