<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Vulnerability Reported: Apache Log4j in Contact Pro</title>
    <link>https://community.sinch.com/t5/Contact-Pro/Security-Vulnerability-Reported-Apache-Log4j/m-p/8829#M232</link>
    <description>&lt;P&gt;TIP: Signing to community allows you to subscribe into interested topic. For example in this one there is three dots button on top left corner and also and arrow down button. Under those you can find subscribe button. This way you ensure that you get latest updates.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 22 Dec 2021 09:33:58 GMT</pubDate>
    <dc:creator>Jukka</dc:creator>
    <dc:date>2021-12-22T09:33:58Z</dc:date>
    <item>
      <title>Security Vulnerability Reported: Apache Log4j</title>
      <link>https://community.sinch.com/t5/Contact-Pro/Security-Vulnerability-Reported-Apache-Log4j/m-p/8805#M226</link>
      <description>&lt;P&gt;&lt;STRONG&gt;28 December 2021: &lt;/STRONG&gt;The hotfixes for log4j are now available:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;FP18:&amp;nbsp;7.0.18.5&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;FP17:&amp;nbsp;7.0.17.10&amp;nbsp;&lt;/LI&gt;&lt;LI&gt;FP16:&amp;nbsp;7.0.16.123&lt;/LI&gt;&lt;LI&gt;FP15:&amp;nbsp;7.0.15.15&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;------------------------&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Cloud&lt;/STRONG&gt;:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;21Q4 release: Log4j has been upgraded to a newer version, and actions recommended by the vendor are implemented.&lt;/LI&gt;&lt;LI&gt;22Q1 release: Log4j dependency has been removed from the product.&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;------------------------&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;22 December 2021: Important update!&lt;/STRONG&gt; Based on the latest information, adjusting the nolookup attribute is not enough. For more information, see &lt;A href="https://logging.apache.org/log4j/2.x/security.html#" target="_blank" rel="noopener"&gt;https://logging.apache.org/log4j/2.x/security.html#&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;In addition to the initial instructions below, you should remove the following class from use: "JndiLookup.class". This can be done with the example PowerShell script below. As always, we recommend validating these changes in the development environment first before moving them to production.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Copy the script to your Notepad, save as a .ps1 file and run it in PowerShell.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;PRE&gt;# start script&lt;BR /&gt;Add-Type -AssemblyName 'System.IO.Compression';&lt;BR /&gt;&lt;BR /&gt;$vus = 'D:\SAP\ContactCenter\VU';&lt;BR /&gt;&lt;BR /&gt;gci $vus -Filter 'log4j2.xml' -Recurse | ForEach {($_ | gc -Raw | ForEach { $_ -replace '%msg%n', '%m{nolookups}%n' }) | sc $_.FullName -Verbose}&lt;BR /&gt;&lt;BR /&gt;Get-ChildItem $vus -Filter 'log4j-core-*.jar' -Recurse | ForEach {Remove-File-From-Zip $_.FullName 'JndiLookup.class'}&lt;BR /&gt;&lt;BR /&gt;function Remove-File-From-Zip {&lt;BR /&gt;[CmdletBinding()]&lt;BR /&gt;param (&lt;BR /&gt;[Parameter(Mandatory)]&lt;BR /&gt;[string]$zipfile,&lt;BR /&gt;[Parameter(Mandatory)]&lt;BR /&gt;[string[]]$files&lt;BR /&gt;)&lt;BR /&gt;&lt;BR /&gt;Write-Output 'Opening: '$_.FullName;&lt;BR /&gt;$stream = New-Object IO.FileStream($zipfile, [IO.FileMode]::Open)&lt;BR /&gt;$mode = [IO.Compression.ZipArchiveMode]::Update&lt;BR /&gt;$zip = New-Object IO.Compression.ZipArchive($stream, $mode)&lt;BR /&gt;$deleted = $false;&lt;BR /&gt;&lt;BR /&gt;($zip.Entries | ? { $files -contains $_.Name }) | % {&lt;BR /&gt;Write-Output "Deleting file '$_' from '$zipfile'";&lt;BR /&gt;$_.Delete();&lt;BR /&gt;$deleted = $true;&lt;BR /&gt;}&lt;BR /&gt;if (-not $deleted) {&lt;BR /&gt;Write-Output 'Nothing found';&lt;BR /&gt;}&lt;BR /&gt;&lt;BR /&gt;$zip.Dispose()&lt;BR /&gt;$stream.Close()&lt;BR /&gt;$stream.Dispose()&lt;BR /&gt;}&lt;BR /&gt;# end script&lt;/PRE&gt;&lt;P&gt;The output should look like this:&lt;/P&gt;&lt;PRE&gt;Opening: &lt;BR /&gt;D:\SAP\ContactCenter\VU\VU_ECF_Agent\tomcat\webapps\ecfs\WEB-INF\lib\log4j-core-2.8.2.jar&lt;BR /&gt;Deleting file 'org/apache/logging/log4j/core/lookup/JndiLookup.class' from ' D:\SAP\ContactCenter\VU\VU_ECF_Agent\tomcat\webapps\ecfs\WEB-INF\lib\log4j-core-2.8.2.jar'&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The recommendation is to do this as soon as possible. This also slightly affects hotfix plans:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;FP18 plan not affected&lt;/LI&gt;&lt;LI&gt;Versions from FP15 to FP17 will receive the fix above&lt;/LI&gt;&lt;LI&gt;Versions FP14 or older no hotfix; carry out the steps in the instructions or update to a newer version Contact Pro&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;-----------------------------------------&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Original post 13 December 2021:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For more information, see:&lt;BR /&gt;&lt;A href="https://www.lunasec.io/docs/blog/log4j-zero-day/" target="_blank" rel="noopener"&gt;https://www.lunasec.io/docs/blog/log4j-zero-day/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.randori.com/blog/cve-2021-44228/" target="_blank" rel="noopener"&gt;https://www.randori.com/blog/cve-2021-44228/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sinch development is working on this issue, and for now we recommend on-premise customers to do the following:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;As a temporary and immediate solution, log writing for all internet facing Java components using Log4j should be disabled.&lt;UL&gt;&lt;LI&gt;&amp;nbsp;To do this, c&lt;SPAN&gt;hange the EcfFrontEndServer logs in both ECF_Agent and ECF_Visitor side:&lt;BR /&gt;LogLevel = never&lt;BR /&gt;LogModule.LibIpc.Level = warning&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;For a solution which allows you to enable logging again:&lt;UL&gt;&lt;LI&gt;Ensure that the installed Java 8 version on application servers is 191 or higher.&lt;/LI&gt;&lt;LI&gt;To fix the &lt;SPAN&gt;log4j2, f&lt;/SPAN&gt;ollow the instruction in &lt;A href="https://eur03.safelinks.protection.outlook.com/?url=https%3A%2F%2Flogging.apache.org%2Flog4j%2F2.x%2F&amp;amp;data=04%7C01%7Cnina.makkonen%40sinch.com%7C204ae8af2ac945a4b11e08d9be1839ee%7C3b518aae89214a7b8497619d756ce20e%7C0%7C0%7C637749833529913504%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&amp;amp;sdata=KHyXPP9i3WXJ%2FnXGXknDfddQ8oKb6P5V4kcvBFS2Q4c%3D&amp;amp;reserved=0" target="_blank" rel="noopener"&gt;https://logging.apache.org/log4j/2.x/&lt;/A&gt;&amp;nbsp;for CVE-2021-44228. You can use the following PowerShell script to adjust the nolookups attribute and modify the path in front of the line to match the install directory but it does not have to point to the correct ECF folder:&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;PRE&gt;gci 'D:\SAP\ContactCenter\VU' -Filter 'log4j2.xml' -Recurse | ForEach {($_ | gc -Raw | ForEach { $_ -replace '%msg%n', '%m{nolookups}%n' }) | sc $_.FullName -Verbose}&lt;/PRE&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;Sinch development is working on a permanent solution which is delivered as a hotfix.&lt;/SPAN&gt;&lt;UL&gt;&lt;LI&gt;&lt;SPAN&gt;For installation on FP14 or older, we recommend upgrade to a newer release or to carry out the steps listed above. Note that the upgrade or hotfix installation will reverse the changes to nolookups. For more information, contact support.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;For installation from FP15 to FP17, we will deliver a hotfix to set the nolookups disabled.&lt;/SPAN&gt;&lt;/LI&gt;&lt;LI&gt;&lt;SPAN&gt;For installation on FP18, we will deliver hotfix where Log4j dependency has been removed from the product.&lt;/SPAN&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;SPAN&gt;For the environments of the cloud customers, these actions are carried out by Sinch.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Feb 2022 08:14:30 GMT</pubDate>
      <guid>https://community.sinch.com/t5/Contact-Pro/Security-Vulnerability-Reported-Apache-Log4j/m-p/8805#M226</guid>
      <dc:creator>Nina_Makkonen</dc:creator>
      <dc:date>2022-02-25T08:14:30Z</dc:date>
    </item>
    <item>
      <title>Re: Security Vulnerability Reported: Apache Log4j</title>
      <link>https://community.sinch.com/t5/Contact-Pro/Security-Vulnerability-Reported-Apache-Log4j/m-p/8829#M232</link>
      <description>&lt;P&gt;TIP: Signing to community allows you to subscribe into interested topic. For example in this one there is three dots button on top left corner and also and arrow down button. Under those you can find subscribe button. This way you ensure that you get latest updates.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 22 Dec 2021 09:33:58 GMT</pubDate>
      <guid>https://community.sinch.com/t5/Contact-Pro/Security-Vulnerability-Reported-Apache-Log4j/m-p/8829#M232</guid>
      <dc:creator>Jukka</dc:creator>
      <dc:date>2021-12-22T09:33:58Z</dc:date>
    </item>
    <item>
      <title>Re: Security Vulnerability Reported: Apache Log4j</title>
      <link>https://community.sinch.com/t5/Contact-Pro/Security-Vulnerability-Reported-Apache-Log4j/m-p/9135#M262</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;as s solution for this we have installed hotfix 7.0.16.123 and have activated logging again.&lt;/P&gt;&lt;P&gt;Our customer asked me now, how this issue was resolved in the end?&lt;/P&gt;&lt;P&gt;Has Log4j been upgraded to a newer version (like in&amp;nbsp;21Q4 cloud release) with 7.0.16.123, or has Log4j dependency removed completly (like 22Q1 cloud release)? If upgraded, to which version?&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 10:29:39 GMT</pubDate>
      <guid>https://community.sinch.com/t5/Contact-Pro/Security-Vulnerability-Reported-Apache-Log4j/m-p/9135#M262</guid>
      <dc:creator>thomashoegl</dc:creator>
      <dc:date>2022-03-16T10:29:39Z</dc:date>
    </item>
    <item>
      <title>Re: Security Vulnerability Reported: Apache Log4j</title>
      <link>https://community.sinch.com/t5/Contact-Pro/Security-Vulnerability-Reported-Apache-Log4j/m-p/9137#M263</link>
      <description>&lt;P&gt;Hi Thomas,&amp;nbsp;&lt;/P&gt;&lt;P&gt;Good that you asked and here is the answer shortly from onprem point of view:&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;FP18 dependency for log4j has been replaced in the hotfix with our own logging solution and we are no more using log4j in Contact Pro&lt;/LI&gt;&lt;LI&gt;Hotfixes for FP17 and older contains actions recommended by Apache in this &lt;A href="https://logging.apache.org/log4j/2.x/security.html#" target="_self"&gt;document&lt;/A&gt;&amp;nbsp;and logging is using log4j&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;In other words we recommend customers upgrading to latest release or minimum to apply hotfix to mitigate the problem.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;//Jukka&lt;/P&gt;</description>
      <pubDate>Wed, 16 Mar 2022 11:00:19 GMT</pubDate>
      <guid>https://community.sinch.com/t5/Contact-Pro/Security-Vulnerability-Reported-Apache-Log4j/m-p/9137#M263</guid>
      <dc:creator>Jukka</dc:creator>
      <dc:date>2022-03-16T11:00:19Z</dc:date>
    </item>
  </channel>
</rss>

