Depending on your organization's infrastructure, on-premise installations may be impacted by the Log4j vulnerability identified by Elasticsearch, which makes up a component of the Axero software. Out of an abundance of caution, we recommend patching your on-premise server with the following mitigation. In addition, we recommend scheduling an on-premise upgrade so that we can update the version of the Elasticsearch software in your installation to mitigate the Log4j vulnerability.
On-premise upgrades can be done independently or scheduled with an Axero support engineer by opening a private support ticket here.
Axero's Elasticsearch technology stack versions are as follows:
Based on the Elasticsearch mitigation matrix in Figure 1.1, the stack has a DNS information leak vulnerability. Our Elasticsearch version does NOT contain the remote code execution vulnerability.
Figure 1.1: Mitigation Summary Matrix (source https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476)
Proposed Solution
Out of an abundance of caution, we recommend patching your on-premise server with the following mitigation. The Elasticsearch organization has proposed the following solution for our current tech stack :
## Remediation for Log4J Vulnerability-Dlog4j2.formatMsgNoLookups=true
curl -X PUT "localhost:9207/_cluster/settings?pretty" -H"Content-Type: application/json" -d"{\"persistent\"{\"cluster.routing.allocation.enable\": \"primaries\"}}"
curl -X POST "localhost:9207/_flush/synced?pretty"
curl -X POST "localhost:9207/_ml/set_upgrade_mode?enabled=true&pretty"
net stop elasticsearch
net start elasticsearch
curl -X GET "localhost:9207/_cat/health?pretty"
curl -X GET "localhost:9207/_cat/nodes?pretty"
Run command:
curl -X PUT "localhost:9207/_cluster/settings?pretty" -H "Content-Type:application/json" -d"{\"persistent\": {\"cluster.routing.allocation.enable\":null}}"
curl -X GET "localhost:9207/_cat/recovery?pretty"
To verify the web app is still communicating properly with Elasticsearch do the following:
An Axero update will be available in January 2022 that will include a new version of the Elasticsearch software that resolves the Log4j vulnerability.
is requesting access to a wiki that you have locked: https://my.axerosolutions.com/spaces/5/communifire-documentation/wiki/view/88217/log4j-pre-release-mitigation-for-on-premise-customers
Your session has expired. You are being logged out.