Good news everyone.
Our security team has just confirmed that cpanel-dovecot-solr is not in fact vulnerable to CVE-2021-45105 nor was it vulnerable to CVE-2021-45046.
Apache Solr’s mitigations and patches from the previous issues also covered this latest vulnerability.
Early patches from upstream and mitigations also protected our customers from this round of vulnerability.
In the log4j release, they stated the following: https://logging.apache.org/log4j/2.x/security.html
When we look at Apache Solr’s guidance, you can see that the fix for the other vulns previously released would also cover this one due to the use of the %X Map pattern:
https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228
Our security team has just confirmed that cpanel-dovecot-solr is not in fact vulnerable to CVE-2021-45105 nor was it vulnerable to CVE-2021-45046.
Apache Solr’s mitigations and patches from the previous issues also covered this latest vulnerability.
Early patches from upstream and mitigations also protected our customers from this round of vulnerability.
In the log4j release, they stated the following: https://logging.apache.org/log4j/2.x/security.html
Please note the line about the PatternLayout mitigation, along with the substitution of %X as a mitigating means.Log4j 2.x mitigation
Implement one of the following mitigation techniques:
Alternatively, this can be mitigated in configuration:
- Java 8 (or later) users should upgrade to release 2.17.0.
- In PatternLayout in the logging configuration, replace Context Lookups like ${ctx:loginId} or $${ctx:loginId} with Thread Context Map patterns (%X, %mdc, or %MDC).
- Otherwise, in the configuration, remove references to Context Lookups like ${ctx:loginId} or $${ctx:loginId} where they originate from sources external to the application such as HTTP headers or user input.
When we look at Apache Solr’s guidance, you can see that the fix for the other vulns previously released would also cover this one due to the use of the %X Map pattern:
https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228
So if you have already patched for CVE-2021-44228, you're also patched against CVE-2021-45046 and CVE-2021-45105.Apache Solr releases are not vulnerable to the follow-up CVE-2021-45046 and CVE-2021-45105, because the MDC patterns used by Solr are for the collection, shard, replica, core and node names, and a potential trace id, which are all sanitized and injected into log files with "%X". Passing system property log4j2.formatMsgNoLookups=true (as described below) is suitable to mitigate.