top of page

ARUN NUKULA

White Structure

Implementing workaround to remediate CVE-2021-44228 for vRealize LogInsight 8.2 - 8.6 versions

Updated: Jun 13, 2022



Here's the PDF document of the same instructions





Note: The content of this blog is same as in KB: 87089 but with screenshots and expected outputs to make things easier




Purpose

  • CVE-2021-44228 has been determined to be present in vRealize Log Insight 8.2 - 8.6 via the Apache Log4j open source component it ships

  • This vulnerability and its impact on VMware products are documented in the following VMware Security Advisory (VMSA), please review this document before continuing: CVE-2021-44228 - VMSA-2021-0028




Resolution

  • The workarounds described in this document are meant to be a temporary solution only.

  • Upgrades documented in the aforementioned advisory should be applied to remediate CVE-2021-44228 when available





Workaround

  • To apply the workaround for CVE-2021-44228 to vRealize Log Insight, perform the following steps:


For each vRealize Log Insight node:


step:1

Download and Copy the li-log4j-fix.sh script or file to /tmp directory


ree

ree

step:2

SSH to the node or use Console by pressing Alt+F1 and login as root and then change or browse to /tmp where the script has been copied


cd /tmp

step:3

List the files to see li-log4j-fix.sh script present

ree

step:4

Run below command to make this executable



chmod +x /tmp/li-log4j-fix.sh

ree

Once executed , you would see that the permissions of the file change

ree

step:5


Next step is to EXECUTE the script


root@li [ /tmp ]# ./li-log4j-fix.sh 

Hardening Log Insight appliance against CVE-2021-44228. For more information refer to: https://www.tenable.com/cve/CVE-2021-44228. 

Patching Log Insight Java options: /etc/default/loginsight... SUCCESS 
Patching Cassandra Java options: /usr/lib/loginsight/application/lib/apache-cassandra-*/conf/jvm.options... SUCCESS 
Patching Tomcat Java options: /usr/lib/loginsight/application/3rd_party/apache-tomcat-*/bin/catalina.sh... SUCCESS 

ATTENTION: Please restart Log Insight service for the patch to take effect.
ree

step:6

Once done perform a LogInsight service restart


service loginsight restart 

Wait for few seconds till vRealize LogInsight is fully up


ree


NOTE:

  • Since i have a standalone node for vRealize LogInsight , there was no need for me to upload and implement patch on other nodes. if there are multiple nodes in your environment then these steps have to be followed on each node one after another

  • Ensure the LogInsight services are completely up and running before proceeding to the next server





Validation

  • To verify the workaround for CVE-2021-44228 has been correctly applied to vRealize Log Insight, perform the following steps:

    1. Log into each node as root via SSH or Console, pressing ALT+F1 in a Console to log in

    2. Run the following command to verify if the workaround was successful:


ps axf | grep --color log4j2.formatMsgNoLookups | grep -v grep

ree

Note: There should be a output from the above command.

If there was no output on any particular node(s), that node(s) was not successfully modified

Re-run the script on that node(s) following the instructions above




 
 
 

Recent Posts

See All

Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page