Last active
December 26, 2021 15:43
-
-
Save paulgalow/3c8c6eac4e7ae76cbdf3ddc2ff12b891 to your computer and use it in GitHub Desktop.
Revisions
-
paulgalow revised this gist
Dec 17, 2021 . 1 changed file with 5 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,6 +1,10 @@ | :bell: UPDATE | |:---------------------------| | GFI has released an [official statement](https://techtalk.gfi.com/impact-of-log4j-vulnerability-on-gfi/) | Log4j hotfix against Log4Shell ([CVE-2021-44228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228)) for Kerio Connect server instances running on Ubuntu 20.04. Please note that at this point it is unclear to me if Kerio Connect is vulnerable. This is meant as a precaution. ⚠️ This will remove the vulnerable `JndiLookup` class from `log4j-core-2.5.jar`. I haven't run into any side effects, but be advised this might cause unintended side effects. ```sh cd /opt/kerio/mailserver/javaservices/im/lib -
paulgalow revised this gist
Dec 12, 2021 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,4 +1,4 @@ Log4j hotfix against Log4Shell ([CVE-2021-44228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2021-44228)) for Kerio Connect server instances running on Ubuntu 20.04. Please note that at this point it is unclear to me if Kerio Connect is vulnerable. This is meant as a precaution. ⚠️ This will remove the vulnerable `JndiLookup` class from `log4j-core-2.5.jar`. I haven't run into any side effects, but be advised this might cause unintended side-effects. -
paulgalow revised this gist
Dec 12, 2021 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -1,4 +1,4 @@ Log4j hotfix (CVE-2021-44228) for Kerio Connect server instances running on Ubuntu 20.04. Please note that at this point it is unclear to me if Kerio Connect is vulnerable to log4shell. This is meant as a precaution. ⚠️ This will remove the vulnerable `JndiLookup` class from `log4j-core-2.5.jar`. I haven't run into any side effects, but be advised this might cause unintended side-effects. -
paulgalow created this gist
Dec 12, 2021 .There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -0,0 +1,11 @@ Log4j hotfix (CVE-2021-44228) for Kerio Connect server instances running on Ubuntu 20.04. ⚠️ This will remove the vulnerable `JndiLookup` class from `log4j-core-2.5.jar`. I haven't run into any side effects, but be advised this might cause unintended side-effects. ```sh cd /opt/kerio/mailserver/javaservices/im/lib systemctl stop kerio-connect.service tar -cvzf log4j-core-2.5.jar-vulnerable.gz log4j-core-2.5.jar zip -d log4j-core-2.5.jar org/apache/logging/log4j/core/lookup/JndiLookup.class systemctl start kerio-connect.service ```