Elastic Elasticsearch Multiple Log4j Vulnerabilities (ESA-2021-31, Log4Shell) - Version Check CVE-2021-44228CVE-2021-45046
- CVSSv3 Score
- Vulnerability description
Elastic Elasticsearch is prone to multiple vulnerabilities in the Apache Log4j library.
- Risk description
The following vulnerabilities exist: CVE-2021-44228: Apache Log4j2 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. This vulnerability is dubbed Log4Shell. CVE-2021-45046: Denial of Service (DoS) and a possible remote code execution (RCE) in certain non-default configurations. Please note the following vendor statement on the impact: Elasticsearch 6 and 7 are not susceptible to remote code execution with this vulnerability due to our use of the Java Security Manager. Elasticsearch running on JDK8 or below is susceptible to an information leak via DNS. Elasticsearch 5 is susceptible to both remote code execution and an information leak via DNS. To avoid unknown risks it is still recommended to apply the update provided by the vendor.
Update to version 6.8.21, 7.16.1 or later.
- Not available