talk.openmrs.org
Open in
urlscan Pro
149.165.155.246
Public Scan
URL:
https://talk.openmrs.org/t/urgent-security-advisory-2021-12-11-re-apache-log4j-2/35341
Submission: On June 10 via api from US — Scanned from DE
Submission: On June 10 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST /login
<form id="hidden-login-form" method="post" action="/login" style="display: none;">
<input name="username" type="text" id="signin_username">
<input name="password" type="password" id="signin_password">
<input name="redirect" type="hidden">
<input type="submit" id="signin-button" value="Log In">
</form>
Text Content
OpenMRS.orgIDAddonsWikiAtlasAsk OpenMRSTalkChatIssuesCodeCI[hide] Skip to main content Sign Up for OpenMRS ID Log In * * * * * * * * URGENT SECURITY ADVISORY 2021-12-11 (RE APACHE LOG4J 2) Community platformsecuritysecurity-advisory You have selected 0 posts. select all cancel selecting Dec 2021 1 / 23 Dec 2021 Jan 2022 graceGrace PotmaOpenMRS Director of Product 2 2021-12 Dear Implementers, Please be aware of the following urgent security vulnerability: SEVERITY: CRITICAL & URGENT AFFECTED VERSIONS * OpenMRS Platform: v 2.4.0 and v 2.4.1 * RefApp: v2.12.0 EXPLOIT * A very urgent security issue in Apache Log4j 2 was made public Dec 10 2021 in a well-used library that affects many web services (see CVE-2021-44228 - Log4j 2 Vulnerability Analysis 9). * The issue can result in an unauthenticated attacker obtaining control of the server. * The exploit code enabling this attack has been made publicly available. RECOMMENDATIONS All implementers using Platform v2.4.0 or 2.4.1 should do the following ASAP: All implementers using RefApp v2.12.0 should do the following ASAP: * Ensure Tomcat is run with -Dlog4j2.formatMsgNoLookups=true. NEXT COMMUNITY STEPS Our platform team is already planning to provide a 2.4.2 release with patched .war files, and we will also provide an updated RefApp release (2.12.1). In the meantime, we’ve pulled the update into the current branch, the 2.5.x release branch (unreleased) and the 2.4.x branch (released but not widely used in production). QUESTIONS Please refer to this OpenMRS Talk Post for further information as it becomes available, and for questions about how to apply this mitigation. For direct questions or concerns, you can also connect with the OpenMRS Security Group at security@openmrs.org. CC: @ibacher @dkayiwa @burke 1 Reply * Security Advisory 2022-02-22 (re Path Traversal Vulnerability)2 * OpenMRS Platform 2.5.0 Released1 * Apache Log4j2 <=2.14.11 * CREATED 2021-12 * LAST REPLY 2022-01 * 22 REPLIES * 5.5k VIEWS * 5 MEMBERS * 49 LIKES * 27 LINKS * 11 5 3 Pinned globally on 2021-12-11 ibacherIan BacherOpenMRS Global Support Team 2021-12 Updated WAR files are now available for 2.5.0-beta.4 and 2.4.2. Full releases are in-process. 1 Reply 3 ibacherIan BacherOpenMRS Global Support Team ibacher 2021-12 A full release is now available for Platform 2.4.2 16. 3 tendomarttendo kiiza Martyn 1 2021-12 grace: > Our platform team is already planning to provide a 2.4.2 release with patched > .war files, and we will also provide an updated RefApp release (2.12.1). > > In the meantime, we’ve pulled the update into the current branch, the 2.5.x > release branch (unreleased) and the 2.4.x branch (released but not widely used > in production). Thanks for addressing this @grace @ibacher can we do some penetrative tests on 2.5.0-beta.4 ? as at Log4Shell: RCE 0-day exploit found in log4j, a popular Java logging package | LunaTrace 2 I can also just find the release at [maven-release-plugin] prepare for next development iteration · openmrs/openmrs-core@c4c182f · GitHub 3 , but can’t find the specific changes. Can you point me to the commit ? 1 Reply 1 ibacherIan BacherOpenMRS Global Support Team tendomart 2021-12 tendomart: > Can you point me to the commit ? The commit that fixes this is this one 4. Log4J 2.15.0 disables the problematic part of code by default and adds some guards which should prevent the same exploit from re-appearing. 1 Reply 2 tendomarttendo kiiza Martyn 1 ibacher 2021-12 Thanks @ibacher Did you try to do Exploits on the previous server versions including 2.5.0-beta.3 ? 1 Reply 1 ibacherIan BacherOpenMRS Global Support Team tendomart 2021-12 No, but it should absolutely be regarded as vulnerable (the problem with being a “platform” in these circumstances is even if there were no way to exploit anything in core, any module might expose the vulnerability). 1 Reply 2 tendomarttendo kiiza Martyn ibacher 2021-12 Thanks, was basically asking to see if you have than that bit testing so i just proceed with final release. 1 graceGrace PotmaOpenMRS Director of Product 2021-12 Update: We are aware that a second Log4J vulnerability has been discovered (article link 1). However, this one is deemed much narrower than the original CVE and far less critical. The plan is to upgrade 2.5.0, update 2.4.x and release 2.4.3. @ibacher will keep us posted here. 2 Replies 1 tendomarttendo kiiza Martyn grace 2021-12 @ibacher sure of the log4j version we need to upgrade to before we do another release ? 1 Reply 1 ibacherIan BacherOpenMRS Global Support Team 1 tendomart 2021-12 @tendomart I already committed the update to the 2.5.x core branch 1, so it should just be a matter of creating the releases. 5 tendomarttendo kiiza Martyn 2021-12 Thanks Ian. 1 ibacherIan BacherOpenMRS Global Support Team 2 grace 2021-12 Alright, Core 2.4.3 (WAR only) is now available. Platform 2.4.3 (full release) is now available. RefApp 2.12.2 is now available. 1 Reply 3 * Reference Application 2.12.0 released 19 days later binduakHimabindu AkkinepalliThoughtWorks ibacher 2022-01 Hi @ibacher Can I request you to make a release on Core 2.1.1(WAR only) with the latest log4j 2.17.1 version. Core 2.1.1 is being used for 0.92 and 0.93 versions of Bahmni and this release is critical for us to upgrade the log4j on all Bahmni repo’s. We will raise the PR with latest log4j 2.17.1 version if it helps. @angshuonline @gsluthra @n0man @rohit.yawalkar @buvaneswariarun @tarunshettygari @swedhan @grace @supriyam @sivareddy 1 Reply 1 * Confirming our Platform "Unsupported Releases" Policy ibacherIan BacherOpenMRS Global Support Team binduak 2022-01 Hi @binduak! Unfortunately, it’s not quite as easy as that. The changes to get OpenMRS to be able to use Log4J2 in place of Log4J1 were fairly extensive and need re-evaluation for how they apply to Core 2.1.x. I.e., this wasn’t simply a matter of swapping out libraries. At the heart of it there are two issues: 1. OpenMRS allows (some) logging configuration to be driven by global properties (log.level, log.layout, and log.location). Support for this is implemented in a somewhat invasive way 1. Replicating this with Log4J2, which uses a fundamentally different configuration system was a challenge and, in retrospect, I didn’t do things quite correctly hence, this PR I’m actively working on 4. 2. OpenMRS uses an appender that stores log messages in-memory. This needed to be completely re-written. (This is called the MemoryAppender) So the actual implementation of Log4J2 in OpenMRS is spread across several commits: * a78c140 3 (Base implementation) * 6e9d0ca 3 (Bugfix) * 1a659a8 3 (Liquibase for some reason embedded Logback) * 9d2489b 3 (Re-implementation of MemoryAppender) * 6b0651b 4 (Re-wiring the StartupFilter to use the new MemoryAppender) Additionally, new commits were needed to the various modules that leverage the memory appender, notable the REST module: * ecc2edd 4 (Initial implementation) * 3e05209 4 (A more reliable way of getting the MemoryAppender) * 7a1be48 5 (Leveraging changes in 6b0651b to more easily get the MemoryAppender) And the Legacy UI module: * a926a70 4 (Added a hack to be able to load messages from the MemoryAppender via reflection on appropriate versions of OpenMRS) I don’t think these changes can just be backported and released as an existing version, because we’d break things for anyone who was using a non-updated 2.1.1. Alternatively, I suppose, alternative pathways could be devised to load the MemoryAppender in 2.1.1 depending on the presence of a getMemoryAppender() method, but that’s not built into the existing PRs and would need to be new development work. The easiest path forward I can see is to get Bahmni running against Core 2.1.4 (the changes for which can be found here 10… I haven’t extensively reviewed them). Then we could maybe work on backporting the Log4J2 patches to the 2.1.x branch and release that as 2.1.5 at least that way we can make suitable changes to at least the REST API to be able to load the server log or, if that’s not a feature Bahmni uses, I suppose we could skip it altogether. I’m, of course, willing to supply whatever support and guidance I can on backporting these patches, but I likely don’t have enough time to take it on as a project myself. It might also be easier to look at the state of things once TRUNK-6052 4 gets merged in as I think that makes a lot of useful changes that should’ve been part of the initial implementation (hopefully it will be ready by the end of the week). 1 Reply 3 ibacherIan BacherOpenMRS Global Support Team ibacher 2022-01 I’ve merged TRUNK-6052 in this commit 5. As I said above, this is kind of a key feature that really should’ve been in 2.4.0 from the beginning. 1 Reply 4 binduakHimabindu AkkinepalliThoughtWorks ibacher 2022-01 Thanks much @ibacher for the detailed commits list. This did help us a lot to start with the log4j changes on 2.1.4 OMRS version. We are still working on the log4j changes for both legacy UI and REST modules. 2 burkeBurke Mamlin/dev/5 2022-01 Thanks so much @ibacher for all the effort and the detailed & well-reasoned description. If the Bahmni team can get these changes adapted for and applied to 2.1.x, do we think it might make it a little easier to forward-port those changes to 2.2 & 2.3? 1 Reply 2 ibacherIan BacherOpenMRS Global Support Team burke 2022-01 @burke Yes… forward-porting is usually more straight-forward that backporting. The bigger issue around this is that this change will definitely break code (which is why I didn’t initially backport it). E.g., this code from Iniz 2, or this code from PIH 2. IIRC, calls to setLevel() should continue to work, but anything that attempts to create an appender is either a no-op (like logger.addAppender()) or will throw an exception, e.g., by attempting to create a new non-console appender. 1 Reply 2 Invalid date Invalid date