License and inventory content modification - BigFix Log4j Scanning Fixlets

The BigFix team is very pleased to announce the release of version 1.0 of BigFix Log4j Scanning Fixlets.

This Fixlet enables organizations to quickly scan their device ecosystem and gain visibility and measurability into where vulnerable versions of Log4j exist on their devices. The Fixlets will scan through various places where Log4j can be found, including .jar files as well as in java archives. Regardless of which of the scans methods you execute, BigFix can retrieve the results in a single analysis.

These Fixlets will enable you to:

  • Better discover, track, and understand your Log4j affected assets
  • Quickly identify, prioritize, and prioritize issues by having the dependency context of your devices

This task will:

  • Download a platform specific JRE or JDK
  • Download a log4j-scan utility JAR file from Logpresso
  • Run the log4j-scan utility JAR with the platform specific JRE or JDK
  • Save results to a file. Results available in an analysis
  • Delete the platform specific JRE or JDK when the scan is completed.

The following platforms are currently excluded:

  • Windows 2012 or older, Windows 8 or older
  • Linux Z and Linux PowerPC Big Endian
  • HP-UX

Important Notes:
This Fixlet relies on an underlying open-source component from LogPresso, a vendor of security solutions. Please ensure that your organization approves using open-source technology from this vendor. HCL Software/BigFix is NOT responsible for the integrity or safety of the LogPresso technology. If you do not want to use the component from LogPresso, do NOT use this Fixlet.

The scan should not be deployed all at once on all systems due to potential impact to shared network and disk resources.

The scanner will try to avoid common network file shares and will not follow symlinks to help prevent common potential problems, but this is not a guarantee that all cases are covered. If you know you need to exclude specific paths, those can be added in the field below.

A BigFix task that can also do mitigation of Log4j vulnerabilities using the same technology is available if you contact us or unofficially through the BigFix community

Published Content:
BES Inventory and License Site version 193

  • Analysis 601: log4j2-scan results
  • Analysis 602: Run: log4j2-scan v2.6.1 - Universal JAR - Download JRE
4 Likes

Could you elaborate or interpret what each property means for us?

Why is the “Vulnerable File Count 0” and yet there is a file listed in “Vulnerable File list”

Example scan results:
log4j Scan - File Result Details [?] Found CVE-2021-4104 (log4j 1.2) vulnerability in /opt/SolarWinds/Agent/bin/Plugins/APM/probes/jmxterm-1.0.0.1000-uber.jar (WORLDS-INF/lib/log4j.jar), log4j N/A
log4j Scan - File Scan Count 146045
log4j Scan - Last Scan Time Sun, 26 Dec 2021 19:58:42 -0500
log4j Scan - Mitigated File Count 0
log4j Scan - Potentially Vulnerable File Count 1
log4j Scan - Scan Duration 8.43 seconds
log4j Scan - Scan Technology Logpresso CVE-2021-44228 Vulnerability Scanner 2.6.1 (2021-12-23)
log4j Scan - Vulnerable File Count 0
log4j Scan - Vulnerable File List /opt/SolarWinds/Agent/bin/Plugins/APM/probes/jmxterm-1.0.0.1000-uber.jar (WORLDS-INF/lib/log4j.jar)

Is the mxterm jar actually vulnerable or was it just found as something to scan and it was found not to be?

It’s… Potentially Vulnerable, which I know isn’t a great answer, but with the Log4j 1.x vulnerabilities it depends on how the application is using Log4j, specifically whether it uses the JMSAppender function.

You should contact SolarWinds or check their support bulletins to determine whether the jmxterm plugin is vulnerable or whether update is available.

There’s a bit of description on how the Logpresso scan identifies these at https://github.com/logpresso/CVE-2021-44228-Scanner/issues/164#issuecomment-997737956

Will there be an updated release from HCL in the next day or so to incorporate the newer scanner release?

Do not detect log4j 2.3.1 and 2.12.3 as vulnerable, in Logpresso v2.6.3

As Apache is reporting:

Upgrade to Log4j 2.3.1 (for Java 6), 2.12.3 (for Java 7), or 2.17.0 (for Java 8 and later).

I also noticed that the downloaded files dont appear to be removed from the bigfix client directory on the clients?

I thought most things were purged after 24hrs?

My inventory scan found infozip on a few hundred servers which made me look.
C:\Program Files (x86)\BigFix Enterprise\BES Client__BESData\BES Inventory and License__Download

After 4 days i still see:

jre.zip
logpresso-log4j2-scan.jar
unzip.exe

Is there a process to clean this out automatically or on demand?

Thank you

We haven’t set up deletion content, expecting most customers would set up recurring scans. I think we can build something pretty easily though, look for it in the next week or two.

Apologies, I think I misunderstood the question to begin with.
You’re referring to these files?

 Directory of C:\Program Files (x86)\BigFix Enterprise\BES Client\__BESData\BES Inventory and License\__Download

01/03/2022  09:57 AM    <DIR>          .
01/03/2022  09:57 AM    <DIR>          ..
01/03/2022  09:56 AM        39,046,089 jre.zip
01/03/2022  09:56 AM           639,740 logpresso-log4j2-scan.jar
12/19/2021  12:11 PM           204,800 unzip.exe
               3 File(s)     39,890,629 bytes

Commonly, we do not manually delete the files from the per-site __Download directory. The directory is automatically cleared when the BES Client is restarted, or when another Action with downloads is taken from the same Site. That’s not unique to this Fixlet, but it might be less noticeable in other sites like “Patches for Windows” where we either have multiple Actions with downloads (each new Action deleting the previous Actions’ downloads), or where the action is usually followed by a system reboot (where the downloads are deleted when the BES Client service is stopped).

In this case, the action isn’t usually followed by a reboot, and this could be the only fixlet with downloads in the “BES Inventory and License” site…so yes I agree we should update the content to manually delete our own downloads after we extract them. I’ll start the process to make that change, we have a few other updates to make as well on providing Remediation and Backout fixlets.

Yes, i was referring to the files you show.

And yes, as the site does not see many actions normally there is no process forcing them to be removed.

Since the scan fixlet downloads and puts a JRE in the utility cache. As a refresher, how often is the utility cache reset? (Is it every client restart, like the general downloads?)

The Utility cache is meant for longer-term storage of things that will be reused by multiple actions. We generally use it for things like “unzip.exe”. The Utility cache is very small by default, but we usually recommend increasing it to around 250 MB.

Once a file is in the Utility cache, it stays there until the cache size is exceeded, then the least-recently-used file is removed from the cache; if it’s referenced in another Action, it gets downloaded again. The Utility cache is persistent across client restarts or system reboots.

The files in the Utility cache are named for their sha1 value and have no extension, so they aren’t usable directly without renaming them. You can find them under __BESData/__Global/__Cache/Utilities :

Can they be reasonably expired? Regardless of mitigating factors, piggybacking a JRE into the cache invites a new set of vulnerability/remediation concerns.

Hi All,
I’m pretty new new, and was reading up on the log4j scanner/fixlet. Could someone point me to where I can download the latest Logpresso v2.6.3 and upload it to BF for use. Is there a link some where that detail the install and how to use?

Thank you

This topic was automatically closed after 30 days. New replies are no longer allowed.