AWS fixes vulnerabilities in Log4Shell hot patch
tostphoto – stock.adobe.com
AWS considerations fixes for a series of Log4Shell hot patches after they grew to change into out to go its companies and products at anxiousness of additional exploitation
A chain of three hot patches issued by Amazon Internet Services and products (AWS) to take care of the Log4Shell vulnerability in Apache Log4j on the extinguish of 2021 bear grew to change into out to themselves bear severe security considerations that meander away standalone AWS servers, Kubernetes clusters, Elastic Container Carrier (ECS) clusters and Fargate at anxiousness of attack.
The quartet of vulnerabilities are being tracked as CVE-2021-3100, CVE-2021-3101, CVE-2022-0070 and CVE-2022-0071 and bear been found by researchers at Palo Alto Networks’ Unit 42, which has been working closely with AWS since December to repair them, and is now able to publicly uncover their existence.
“Given the urgency surrounding Log4Shell, it’s possible that this hot patch became deployed at scale, inadvertently inserting all kinds of container environments at anxiousness,” said Unit 42 researcher Yuval Avrahai.
“Multi-tenant container environments and clusters operating untrusted photography are particularly at anxiousness. Palo Alto Networks encourages customers to upgrade to the mounted hot patch model as soon as possible.”
On the other hand, Avrahai added, IT teams who bear (for some cause) no longer but patched their AWS environments in opposition to it will aloof aloof prioritise the usual patches.
“Whereas the equipped considerations can lead to severe assaults in opposition to container environments, Log4Shell has rightfully earned its difficulty as one of many worst vulnerabilities of all time and is aloof being actively exploited,” he said.
“We’d bear to thank AWS for his or her partnership and coordination in remediating this vulnerability successfully. As Log4Shell exploitation peaked, AWS’s hot patch helped the team extinguish limitless assaults. With these vulnerabilities mounted, it’s now possible to make exercise of the original patch to take care of Log4Shell whereas additionally conserving container environments receive.”
Unit 42 said that after inserting in the patch provider to a server or cluster, each and every container in that atmosphere became able to profit from it to purchase over the underlying host. To illustrate, if build in to a Kubernetes cluster, each and every container in that cluster would bear been able to dawdle except the usual patch became rolled relief or upgraded. Unprivileged processes may perhaps additionally bear exploited the patch to escalate privileges and diagram root code execution.
It added that container dawdle became possible regardless of whether or no longer or no longer the person is operating any Java applications, or whether or no longer their underlying host is operating the hardened AWS Linux distribution for containers, Bottlerocket. Containers operating with person namespaces or as a non-root person are additionally affected.
Unit 42 and AWS found that the inconvenience arose for the reason that hot patches bear been constantly browsing for Java processes and patching them in opposition to Log4Shell on the wing, with any assignment operating a binary named “java” belief of as a candidate, whether or no longer interior or start air a container.
Internal containers, the original patches invoked the container’s “java” binary twice, as soon as to retrieve it and on the choice hand to inject the original patch. Nevertheless they did so with out successfully containerising the binaries. This meant original container processes may perhaps then dawdle with out the obstacles that will generally practice to them, so a malicious container may perhaps encompass a malicious “java” binary to trick the original patch into invoking it with elevated privileges. Starting up air of containers, the provider patched host processes equally, with the identical total end result.