Mitigating Log4j2 vulnerabilities for Experience Manager Forms
Issue
Critical security vulnerabilities have been reported for Apache Log4j2, a popular logging library for Java-based applications. The following vulnerabilities have been analyzed:
Resolution
You can use one of the following methods to mitigate the risk of this vulnerability:
- Install the latest service pack
- Use manual mitigation steps
Install the latest service pack
Use manual mitigation steps
To mitigate the issue, for Experience Manager 6.5 Forms (log4j-core version 2.10 and later), Experience Manager 6.4 Forms (log4j-core version earlier than 2.10), and Experience Manager 6.3 Forms (log4j-core version earlier than 2.10), perform the following steps:
-
Shut down all the server instances and locators.
-
Remove
org/apache/logging/log4j/core/lookup/JndiLookup.class
from the vulnerablelog4j-core-2.xx.jar
available at the following locations:- Deployable EAR:
code language-javascript <FORMS_INSTALLATION_DIRECTORY>/configurationManager/export/adobe-livecycle-[jboss|weblogic|websphere].ear
- GemFire or Geode locator:
code language-javascript <FORMS_INSTALLATION_DIRECTORY>/lib/caching/lib
To update Deployable EAR, depending on your operating system, you can use one of the following methods to remove the
JndiLookup.class
from the vulnerablelog4j-core-2.xx.jar
:- (Linux with Oracle WebLogic or Redhat JBoss): Run the following command. Update the
version
and application server information before running these commands:
code language-javascript unzip adobe-livecycle-<weblogic|jboss>.ear lib/log4j-core-<version>.jar
code language-javascript zip -d lib/log4j-core-xxx.jar org/apache/logging/log4j/core/lookup/JndiLookup. class
code language-javascript zip -ru adobe-livecycle-jboss.ear lib/log4j-core-<version>.jar
- (Linux with IBM WebSphere): Run the following command. Update the
version
and application server information before running these commands:
code language-javascript unzip adobe-livecycle-websphere.ear log4j-core-<version>.jar
code language-javascript zip -d log4j-core-xxx.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
- (Microsoft Windows): Use a GUI tool like 7-Zip to remove the class file.
-
Repeat step 2 for each application server instance (node) and all locators (if more than one).
-
After updating the jar, redeploy the modified EAR and restart all locator processes and server instances.
- Replace the original copy of the log4j-core-2.xx jar with the updated copy. No other changes are required.
- When the configuration manager is run again, contents of
<FORMS_INSTALLATION_DIRECTORY/configurationManager/export
can be overwritten. To avoid redoing the above change each time this happens, update the jar in<FORMS_INSTALLATION_DIRECTORY>/deploy/adobe-core-[jboss|weblogic|websphere].ear
. This ensures that theadobe-livecycle-[jboss|weblogic|websphere].ear
produced by configuration manager already has the updatedlog4j-core-2.xx jar
. - Manual modifications to deployable artifacts can be overwritten on patching/upgrade. If this happens, reapply the procedure.
References
https://logging.apache.org/log4j/2.x/security.html
Who should I contact if I have additional questions or any issues in performing mitigation steps?
You can contact Adobe Support or raise a support ticket.
Who should I contact if I have additional questions or any issues in performing mitigation steps?
Legal Notices | Online Privacy Policy