Security Bulletin
Summary
IBM Rational Build Forge is vulnerable to CVE-2021-44228 as the jas.war is built upon Java-1.8 and leverages Apache Log4j 2.6.1 jar file. The fix includes Apache Log4j 2.17.1.
Vulnerability Details
CVEID: CVE-2021-44228
DESCRIPTION: Apache Log4j could allow a remote attacker to execute arbitrary code on the system, caused by the failure to protect against attacker controlled LDAP and other JNDI related endpoints by JNDI features. By sending a specially crafted code string, an attacker could exploit this vulnerability to load arbitrary Java code on the server and take complete control of the system.
Note: The vulnerability is also called Log4Shell or LogJam.
CVSS Base score: 10
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/214921 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Affected Products and Versions
| Affected Product(s) | Version(s) |
| IBM Rational Build Forge | 8.0.0.5-8.0.0.20 |
Remediation/Fixes
Address the vulnerability by upgrading to IBM Rational Build Forge 8.0.0.21 that includes the Apache Log4j-2.17.1 jars.
.
Workarounds and Mitigations
For those who would like to defer upgrading to IBM Rational Build Forge 8.0.0.21, IBM strongly recommends addressing the the vulnerability now by following the steps listed in this section.
Important note:
These are high level steps, please adjust the paths according to os-platform, Tomcat or Webshpere. The important part here is to remove the JndiLookup.class file from the log4j-core-2.6.1.jar file, which is included in jas.war file.
It is recommended to try these steps on test/staging environment and gain confidence, before applying to production.
IBM Rational Build Forge versions 8.0.0.5 to 8.0.0.20 include log4j-api-2.6.1.jar and log4j-core-2.6.1.jar files.
For releases from 2.0-beta9 to 2.7, the only mitigation is to remove the JndiLookup.class from the classpath
Steps to remediate: (For Tomcat users)
- Stop Build Forge services.
- Successfully backup the Database and <BF-INSTALL> folder for safety.
- Locate the jas.war file in the Build Forge installation area (<BF_INSTALL>/server/apache/tomcat/webapps/ or equivalent)
- In the same path ‘jas’ folder is created, move it to temporary (c:\temp or /tmp) folder as backup
- Move the ‘work’ folder which was created while starting the services, to temporary folder as backup (<BF_INSTALL>/server/apache/tomcat/work)
- The above steps should ensure that old/cache data has been moved to temporary folder as backup.
- Backup the original jas.war: Copy jas.war as c:\temp\original_jas.war file (example: <BF_INSTALL>/server/apache/tomcat/webapps/jas.war or equivalent)
- Remove JndiLookup.class :
Using any archive tool (7zip or equivalent)
Open in archive for the file jas.war
Locate WEB-INF/eclipse/plugins/com.ibm.jas-1.0.jar (within archive only)
Open com.ibm.jas-1.0.jar (within archive for editing)
Locate the path: java/lib
Locate the file log4j-core-2.6.1.jar file.
Open log4j-core-2.6.1.jar (within archive for editing)
Locate the path: org/apache/logging/log4j/core/lookup
Delete the class file: JndiLookup.class
Return or Save the archive.
- Restart Build Forge services.
Steps to revert to original state: (Tomcat users)
- Stop Build Forge services.
- Delete work folder (<BF_INSTALL>/server/apache/tomcat// or equivalent)
- Delete the jas folder (<BF_INSTALL>/server/apache/tomcat/webapps/jas or equivalent)
- Copy the jas.war from backup to (<BF_INSTALL>/server/apache/tomcat/webapps)
- Start the Build Forge services.
For WebSphere users, steps to remediate:
- Stop Build Forge services.
- Complete successful backup of Database and BF-Install folder.
- Backup the entire AppSrv01 or similar folder in WAS. Usually <WAS-HOME>/profile
- In Build Forge Home backup the jas.war (BF_HOME/PrepForExternal)
- Modify jas.war using archive tool to remove JndiLookup.class
- Ensure the work-folders or temp-folders referring to jas.war or jas_war are removed. This is to ensure that old references to JndiLookup.class files to be deleted.
- Re-install jas.war. (In WAS, uninstall and install jas.war)
- Start Build Forge services
For WebShpere users, steps to revert to original state:
- Stop Build Forge services.
- Delete work folder and jas folders
- Copy the jas.war from backup under (BF_HOME/PrepForExternal)
- Re-install original jas.war (In WAS, uninstall and install jas.war)
- Start the Build Forge services.
Get Notified about Future Security Bulletins
References
Change History
20 Dec 2021: Initial Publication
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
Disclaimer
Review the IBM security bulletin disclaimer and definitions regarding your responsibilities for assessing potential impact of security vulnerabilities to your environment.
Document Location
Worldwide
Was this topic helpful?
Document Information
Modified date:
14 January 2022
UID
ibm16541008