SB2022011034 - IBM TPF Operations Server update for Apache Log4j
Published: January 10, 2022 Updated: April 14, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Infinite loop (CVE-ID: CVE-2021-45105)
The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to infinite loop within the StrSubstitutor class. A remote attacker can pass specially crafted input to the application, consume all available system resources and cause denial of service conditions.
Payload example: ${${::-${::-$${::-j}}}}
2) Code Injection (CVE-ID: CVE-2021-45046)
The vulnerability allows a remote attacker to compromise the affected system.
The
vulnerability exists due to incomplete patch in Apache Log4j 2.15.0 for
a code injection vulnerability #VU58816 (CVE-2021-44228) in certain
non-default configurations. A remote attacker with control over Thread
Context Map (MDC) input data when the logging configuration uses a
non-default Pattern Layout with either a Context Lookup (for example,
$${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) can
pass malicious data using a JNDI Lookup pattern and perform a denial of
service (DoS) attack, exfiltrate data or execute arbitrary code.
Later discovery demonstrates a remote code execution on macOS but no other tested environments.
Remediation
Install update from vendor's website.
References
- https://www.ibm.com/blogs/psirt/security-bulletin-apache-log4j-vulnerabilities-impact-z-transaction-processing-facility-z-tpf-and-tpf-operations-server-cve-2021-45105-cve-2021-45046/"
- https://www.ibm.com/blogs/psirt/security-bulletin-apache-log4j-vulnerabilities-impact-z-transaction-processing-facility-z-tpf-and-tpf-operations-server-cve-2021-45105-cve-2021-45046/</a></p><p>
- https://www.ibm.com/support/pages/node/6538936</p><p><br></p>