Article topics
Introduction
DRACOON has implemented a number of mitigations for the log4j CVEs that have been published in the last few weeks and pays close attention to the official Apache Log4j Security Vulnerabilities webpage: Apache Log4j Security Vulnerabilities.
Even though most of the components in DRACOON products were not affected, all recommended mitigations have been implemented and new releases for components in DRACOON Server and DRACOON LTS 2019-1 have been published. This is to ensure that no library dependency, which is outside DRACOON's control, can negatively affect the product.
Customers running DRACOON LTS 2019-1 must pay particular attention to these new releases and upgrade their environments as soon as possible.
In a nutshell, mitigations have been implemented to address the following CVEs:
- CVE-2021-44228 - Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints
- CVE-2021-45046 - Apache Log4j2 Thread Context Lookup Pattern vulnerable to remote code execution in certain non-default configurations
- CVE-2021-45105 - Apache Log4j2 does not always protect from infinite recursion in lookup evaluation.
- CVE-2021-44832 - Apache Log4j2 vulnerable to remote code execution in certain non-default configurations
The tables below break down the products and mitigations customers need to implement to ensure a vulnerability-free environment.
DRACOON Cloud
All backend components within the DRACOON Cloud have been reviewed and patched further, even though none of the components have been directly vulnerable by the CVEs: all components do not use the log4j-core package or depend on it.
DRACOON clients
DRACOON Cloud can be used via different end-user interfaces. The list below describes all DRACOON products and their status.
Client
|
Version
|
Status
|
---|---|---|
DRACOON for Windows | All versions | |
DRACOON for Mac | All versions | |
DRACOON for Outlook | All versions | |
DRACOON for Teams | All versions | |
DRACOON for Zapier | All versions | |
DRACOON for iOS | All versions | |
DRACOON for Android | All versions |
Table last updated on: 21 Dec 2021
DRACOON Server
Important
All components within the DRACOON Server have been reviewed and patched further, even though they have not been directly vulnerable by the CVEs: all components do not use the log4j-core package or depend on it. Run "yum update" on your DRACOON Server instances to install all the latest security patches.
The mitigations below are safe against all 4 known log4j CVEs: CVE-2021-44228, CVE-2021-45046 CVE-2021-45105 and CVE-2021-44832
More information about updating your DRACOON Server instance can be found here: https://server.support.dracoon.com/hc/de/articles/4405085887378
Software | Service | Affected version | Mitigation |
---|---|---|---|
Backend |
DRACOON Core Service |
Upgrade to 4.26.7 |
|
DRACOON OAuth Service | Upgrade to 4.20.6 | ||
DRACOON Branding Service | Upgrade to 1.4.2 | ||
DRACOON Admin Service | Upgrade to 1.0.3 | ||
DRACOON License Service | Upgrade to 1.0.2 | ||
DRACOON WebDAV Proxy | Upgrade to 5.4.2 | ||
Workers |
DRACOON Webhook Dispatcher | Upgrade to 1.1.6 | |
DRACOON Webhook Worker | Upgrade to 1.1.4 | ||
DRACOON Message Sender Worker | Upgrade to 1.4.4 | ||
DRACOON Mail Notification Dispatcher | Upgrade to 1.2.4 | ||
DRACOON S3 CMUR Worker | Upgrade to 1.5.0 | ||
Web App | DRACOON Web App | Upgrade to 5.12.6 | |
DRACOON Branding Web App | Upgrade to 1.8.1 |
Table last updated on: 21 Dec 2021
DRACOON LTS 2019-1
Important
Customers must update all services as soon as possible!
The mitigations below are safe against all 4 known log4j CVEs CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105 and CVE-2021-44832
Software | Service | Affected version | Mitigation |
---|---|---|---|
Backend | DRACOON Core Service |
Upgrade to 4.12.12-noJndiLookup |
|
DRACOON OAuth Service |
Upgrade to 4.12.4-LTS-noJndiLookup |
||
DRACOON Branding Service |
- |
||
DRACOON WebDAV Proxy |
Upgrade to 5.2.4-LTS |
||
Web App | DRACOON Web App | - | |
DRACOON Branding Web App | - | ||
Clients |
DRACOON for Outlook | - | |
DRACOON for Teams | - | ||
DRACOON for iOS |
- | ||
DRACOON for Android | - | ||
DRACOON for Win |
- |
||
DRACOON for Mac | - |
Table last updated on: 21 Dec 2021
Component update for LTS 2019-1
Please follow the instructions in the corresponding articles:
DRACOON SDKs
Library
|
Affected version
|
---|---|
C# SDK | |
C# Crypto SDK | |
Java SDK | |
Java Crypto SDK | |
Swift SDK | |
Swift Crypto SDK | |
JavaScript Crypto SDK |
Table last updated on: 21 Dec 2021
Comments
0 comments
Article is closed for comments.