Fortify SSC v20.* is vunerable with respect to CVE-2021-44228.
Any experience using the Log4J settings work around?
Application Delivery Management
Application Modernization & Connectivity
CyberRes
IT Operations Management
Fortify SSC v20.* is vunerable with respect to CVE-2021-44228.
Any experience using the Log4J settings work around?
Statement made available from Micro Focus legal around 12/12/2021 @ 5:34 pm CST.
----
If you've identified anything to the contrary you can report it here: www.microfocus.com/.../product-security-response-center
Hi Ebell,
We can create a template at the audit workbanch to block any project what contain call to lib org.apache.logging.log4j:log4j-core? If is posible, can you tel me how?
@ebell. Can you clarify, are you saying (a) that your SSC software is not susceptible to the vulnerability even though it contains impacted versions of log4j, or (b) that you are not aware of any exploits on your hosted SSC/Scan central service?
If there is an official position statement on this issue, please can you post a link?
David, that's all I have at the moment. I know CyberRes and each product is working toward further specifics.
Here are a couple of links with additional information community.microfocus.com/.../summary-of-cyberres-impact-from-log4j-or-logshell-logjam-cve-2021-44228 and www.microfocus.com/.../log4j
In my client enviroment I've (stopped tomcat service and) replaced
on SSC
apps\Tomcat\webapps\ssc\WEB-INF\externallib\birtrunner\log4j-api-2.14.1.jar
apps\Tomcat\webapps\ssc\WEB-INF\externallib\birtrunner\log4j-core-2.14.1.jar
apps\Tomcat\webapps\ssc\WEB-INF\externallib\birtrunner\log4j-slf4j-impl-2.14.1.jar
apps\Tomcat\webapps\ssc\WEB-INF\externallib\iidmigrator\log4j-api-2.14.1.jar
apps\Tomcat\webapps\ssc\WEB-INF\externallib\iidmigrator\log4j-core-2.14.1.jar
apps\Tomcat\webapps\ssc\WEB-INF\externallib\runtime-bridge\log4j-api-2.14.1.jar
apps\Tomcat\webapps\ssc\WEB-INF\externallib\runtime-bridge\log4j-core-2.14.1.jar
apps\Tomcat\webapps\ssc\WEB-INF\lib\log4j-api-2.14.1.jar
apps\Tomcat\webapps\ssc\WEB-INF\lib\log4j-core-2.14.1.jar
apps\Tomcat\webapps\ssc\WEB-INF\lib\log4j-jul-2.14.1.jar
apps\Tomcat\webapps\ssc\WEB-INF\lib\log4j-slf4j-impl-2.14.1.jar
on ScanCentral SAST controller
apps\Tomcat\webapps\scancentral-ctrl\WEB-INF\lib\log4j-1.2-api-2.14.1.jar
apps\Tomcat\webapps\scancentral-ctrl\WEB-INF\lib\log4j-api-2.14.1.jar
apps\Tomcat\webapps\scancentral-ctrl\WEB-INF\lib\log4j-core-2.14.1.jar
apps\Tomcat\webapps\scancentral-ctrl\WEB-INF\lib\log4j-jcl-2.14.1.jar
to the proper log4j-*-2.15.0.jar files extracted from latest Log4j version downloaded from logging.apache.org/.../download.html
Can Microfocus confirm that this mitigation resolves CVE-2021-44228 vulnerability??
thanks
--
Pawel
My recommendation would be to follow the information provided in the above-referenced links and product security bulletins. If you need additional assistance, clarification, etc. please open a ticket with support.