Log4j zero day remote code execution exploit

Need help? Post your questions here.

Moderator: moderators

Log4j zero day remote code execution exploit

Postby WalkingMan » Tue Dec 14, 2021 12:31 am

Hello,
I didn't see anything confirming one way or another so wanted to ask. I know Subsonic relies on Log4j. Can anyone confirm if Subsonic is impacted by this exploit?
If it is any feedback on how to fix and secure?
thanks in advance!

(http://www.subsonic.org/pages/libraries.jsp)

https://www.veracode.com/blog/security-news/urgent-analysis-and-remediation-guidance-log4j-zero-day-rce-cve-2021-44228
WalkingMan
 
Posts: 2
Joined: Tue Dec 14, 2021 12:24 am

Re: Log4j zero day remote code execution exploit

Postby G8DHE » Tue Dec 14, 2021 8:18 am

The version of Subsonic I'm using uses the earlier version of LOG4j which isn't affected by the current exploits but has other problems.
Geoff G8DHE
Version 6.0 Beta 2
G8DHE
 
Posts: 139
Joined: Sun Nov 04, 2012 4:56 pm

Re: Log4j zero day remote code execution exploit

Postby Phatteus » Tue Dec 14, 2021 2:07 pm

Most companies that rely on log4j (and many that don't) are releasing statements regarding this vulnerability (https://nvd.nist.gov/vuln/detail/CVE-2021-44228)

I'd like to see Subsonic do the same. My version of Subsonic appears to use log4j 1.2.16

From NVD (highlight is mine, to indicate relevance with my version of Subsonic):

Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatMsgNoLookups" to “true” or it can be mitigated in prior releases (<2.10) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class).


Is the proposed solution something we can do ourselves without breaking functionality in Subsonic?
Phatteus
 
Posts: 6
Joined: Sat Feb 25, 2017 3:36 pm

Re: Log4j zero day remote code execution exploit

Postby J_T_W » Tue Dec 14, 2021 4:25 pm

J_T_W
 
Posts: 93
Joined: Fri May 03, 2013 2:13 pm

Re: Log4j zero day remote code execution exploit

Postby Phatteus » Tue Dec 14, 2021 6:17 pm



This is very helpful, thank you!
Phatteus
 
Posts: 6
Joined: Sat Feb 25, 2017 3:36 pm


Re: Log4j zero day remote code execution exploit

Postby WalkingMan » Tue Dec 14, 2021 10:36 pm

Phatteus wrote:


This is very helpful, thank you!


Agree! Thank you so much!
WalkingMan
 
Posts: 2
Joined: Tue Dec 14, 2021 12:24 am

Re: Log4j zero day remote code execution exploit

Postby jay_uk » Wed Dec 15, 2021 10:41 am

Phatteus wrote:Most companies that rely on log4j (and many that don't) are releasing statements regarding this vulnerability (https://nvd.nist.gov/vuln/detail/CVE-2021-44228)

I'd like to see Subsonic do the same. My version of Subsonic appears to use log4j 1.2.16

From NVD (highlight is mine, to indicate relevance with my version of Subsonic):

Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property "log4j2.formatMsgNoLookups" to “true” or it can be mitigated in prior releases (<2.10) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class).


Is the proposed solution something we can do ourselves without breaking functionality in Subsonic?


So without migrating to Airsonic, is there anything that we need/can do to fix the log4j exploit? My version also uses 1.2.16.
jay_uk
 
Posts: 9
Joined: Fri Mar 30, 2012 7:02 pm

Re: Log4j zero day remote code execution exploit

Postby G8DHE » Wed Dec 15, 2021 1:04 pm

As I understand it the current CVE relates only to Log4j version 2 - https://nvd.nist.gov/vuln/detail/CVE-2021-44228
There have been other problems relating to Log4j version 1 which have been listed here - https://cve.mitre.org/cgi-bin/cvename.c ... 2019-17571

Perhaps the first thing we need to understand is which versions of Subsonic use log4j2 and which use Log4j1 ?
I've stuck with Subsonic V6.0 which only uses Log4j1 so appear to be unaffected by the current concerns although still open to the previous CVE-2019-17571
Perhaps others using different versions of Subsonic can confirm which release is used ?
Geoff G8DHE
Version 6.0 Beta 2
G8DHE
 
Posts: 139
Joined: Sun Nov 04, 2012 4:56 pm

Re: Log4j zero day remote code execution exploit

Postby bushman4 » Wed Dec 15, 2021 2:11 pm

G8DHE wrote:As I understand it the current CVE relates only to Log4j version 2 - https://nvd.nist.gov/vuln/detail/CVE-2021-44228
There have been other problems relating to Log4j version 1 which have been listed here - https://cve.mitre.org/cgi-bin/cvename.c ... 2019-17571

Perhaps the first thing we need to understand is which versions of Subsonic use log4j2 and which use Log4j1 ?
I've stuck with Subsonic V6.0 which only uses Log4j1 so appear to be unaffected by the current concerns although still open to the previous CVE-2019-17571
Perhaps others using different versions of Subsonic can confirm which release is used ?


The latest version, 6.1.6, uses Log4j1.

Glenn
Glenn Sullivan
Subsonic 6.1.6 (Unraid Docker)
90 regular Subsonic Users

Library as of 2024-10-28:
4,527 artists
19,996 albums
282,151 songs
10201.40 GB
41,583 hours
User avatar
bushman4
 
Posts: 875
Joined: Thu Dec 02, 2010 1:47 pm
Location: Massachusetts, USA

Re: Log4j zero day remote code execution exploit

Postby G8DHE » Wed Dec 15, 2021 4:51 pm

In that case it seems to me from the write-ups that Subsonic will only be affected by the exploits dating from 2019 and not the latest problems - unless anyone knows better ?
Geoff G8DHE
Version 6.0 Beta 2
G8DHE
 
Posts: 139
Joined: Sun Nov 04, 2012 4:56 pm

Re: Log4j zero day remote code execution exploit

Postby bushman4 » Wed Dec 15, 2021 5:34 pm

G8DHE wrote:In that case it seems to me from the write-ups that Subsonic will only be affected by the exploits dating from 2019 and not the latest problems - unless anyone knows better ?


Correct. And the Log4j1 serialization vulnerability requires that the software have an open log4j.net.SocketServer and that that port is reachable by the attacker. In my install (running in a docker on Unraid), subsonic is listening on ports 4040 (the web interface) and also ports 9412, 38629, 34185, and 40973. I have no idea why it is listening on those other ports, but the only port I have forwarded into it from my border firewall is 4040, so even if one of those other ports are a log4j.net.SocketServer, the only people who would be able to hit it are on my internal network.

I am not concerned about that attack vector personally.

(NB: While network security is my profession, and Log4J2 has been my focus for the past 5 days, I do not have the code, so I am only reporting on what I can see from external diagnostic and forensic techniques)

Glenn
Glenn Sullivan
Subsonic 6.1.6 (Unraid Docker)
90 regular Subsonic Users

Library as of 2024-10-28:
4,527 artists
19,996 albums
282,151 songs
10201.40 GB
41,583 hours
User avatar
bushman4
 
Posts: 875
Joined: Thu Dec 02, 2010 1:47 pm
Location: Massachusetts, USA


Return to Help

Who is online

Users browsing this forum: No registered users and 17 guests