- Created: December 10, 2021
- Updated: December 16, 2021, offered Log4j 2.16 libraries
- Updated: December 20, 2021, offered Log4j 2.17 libraries
- Updated: December 22, 2021, Added same directory backup warning
- Updated: January 3, 2022, offered Log4j 2.17.1 libraries
Friday, December 10 2021, a zero-day exploit in the popular Java logging library log4j was discovered that results in Remote Code Execution (RCE) by logging a certain string.
Read this document carefully to see if you're impacted, and if yes, what to do.
Yes. The vulnerability is found in versions 2.0 to 2.14.1 of Apache Log4j. CostPerform latest version uses version 2.13.0 of Log4J, which is one of the affected versions.
It depends on your current CostPerform version.
See: Modify the startup options of the programs.
or
You could upgrade Log4j to the latest version (Log4j 2.17.1). See Upgrade Log4j
See: Modify the logging pattern
In the following descriptions, %COSTPERFORM_HOME% points to the directory where CostPerform is installed.
Read this whole description before attempting the modification!
Always create backups of deleted or modified files. Do NOT backup files in the same directory. This might cause errors. Keep backups OUTSIDE the installation directory!
- Stop the server, service or client
- Open Windows Explorer
- Navigate to
%COSTPERFORM_HOME%\bin
- Open the file
cpjava9args.txt
- Insert a new line at the very top
- Paste this line as the first line:
-Dlog4j2.formatMsgNoLookups=true
- Save the file
- Repeat steps 5-7 for the file
%COSTPERFORM_HOME%\server\webswing\webswingargs.txt
This procedure is valid for both servers and clients.
Read this whole description before attempting the modification!
Always create backups of deleted or modified files. Do NOT backup files in the same directory. This might cause errors. Keep backups OUTSIDE the installation directory!
- Stop the server, service or client
- Open Windows Explorer
- Navigate to
%COSTPERFORM_HOME%\settings
- Open each XML file
- In each file, find all the occurrences of
%m
(There can be multiple occurrences of%m
per file) - Replace each occurrence with
%m{literal}{nolookups}{/literal}
- Save the file.
We will incorporate the fixes that Log4j will release into our next release.
If you require more information please contact our Support line on +31 (0)347 355 027 or send an email to support@costperform.com.
- CVE-2021-44228 information
- https://nvd.nist.gov/vuln/detail/CVE-2021-44228
- Background information
- https://www.lunasec.io/docs/blog/log4j-zero-day/
- Pre-version 2.10 mitigation information
- https://issues.apache.org/jira/browse/LOG4J2-2109
- Apache Log4J home
- https://logging.apache.org/log4j/2.x