APC UPS Data Center & Enterprise Solutions Forum
Schneider, APC support forum to share knowledge about installation and configuration for Data Center and Business Power UPSs, Accessories, Software, Services.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-11 12:04 PM
It looks like the log4j files included in Powerchute may be vulnerable to the log4shell vulnerability
C:\Program Files\APC\PowerChute>dir *log*.jar /b/s/l
c:\program files\apc\powerchute\group1\lib\commons-logging-1.1.1.jar
c:\program files\apc\powerchute\group1\lib\log4j-api-2.10.0.jar
c:\program files\apc\powerchute\group1\lib\log4j-core-2.10.0.jar
c:\program files\apc\powerchute\group1\lib\log4j-slf4j-impl-2.10.0.jar
Can anybody confirm and provide any necessary patches/instructions to update
It would also be good to add an official statement to the reddit post at https://www.reddit.com/r/msp/comments/rdba36/critical_rce_vulnerability_is_affecting_java/
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 06:28 AM . Last Modified: 2021-12-16 03:42 PM
Updating this post with SE security bulletin.
To mitigate Apache Log4j Vulnerability (Log4Shell) in PowerChute follow the instruction is linked security bulletin.
https://www.se.com/ww/en/download/document/SESB-2021-347-01/
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-12 01:12 PM
I too can confirm.
PowerChute Business Edition 10.0.2.301
C:\Program Files (x86)\APC\PowerChute Business Edition\agent\lib\log4j-core-2.11.1.jar
C:\Program Files (x86)\APC\PowerChute Business Edition\agent\lib\log4j-core-2.11.1.jar
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-13 12:24 AM
Can someone provide more info about this.
Fixes, Statements, Patches etc.. ?
Or does someone know if something like this is possible and where:
-Dlog4j2.formatMsgNoLookups=true
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-13 09:28 AM
Powerchute Remote Shutdown 4.3 contains affected versions as well:
/opt/APC/PowerChute/group1/lib/log4j-core-2.10.0.jar
/opt/APC/PowerChute/group1/lib/log4j-api-2.10.0.jar
/opt/APC/PowerChute/group1/lib/log4j-slf4j-impl-2.10.0.jar
/opt/APC/PowerChute/group1/log4j2.xml
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-13 10:17 AM
It's probably worth fire-walling port 6547 regardless. At least that's the port for Business Edition 9.5, not sure about other versions.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-14 07:35 AM
As my version was between 2.0 and 2.10, I removed the JndiLookup.class from the jar
zip -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-14 09:15 AM
According to this:
https://github.com/NCSC-NL/log4shell/blob/main/software/README.md
If you Upgrade to 10.0.4 you should be fine. 👍
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-14 09:29 AM
Where do you see anything saying 10.0.4 is ok on the link your provided?
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-14 02:36 PM
APC | PowerChute Business Edition | Unknow to 10.0.2.301 | Vulnerable |
Hm yeah maybe youre right...
I was a bit to fast but here i guess it says from version Unknown to 10.0.2.301 is vulnerable.
So i thought version 10.0.4 should be fine.
Tomorrow i try to install the new version on one of our test Servers and i will look for the Log4 Version.
I keep you up to date.
BTW:
I already have opened a ticket but the support is kind a missunderstanding the problem...
They just said thanks for sending us the info.
Someone else told em allready that they got hacked and he said to me theyr security team is allready on it 😅
I was asking them to give a solution or at least a clear statement, i not giving a hint for a hacking attack...
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 06:28 AM . Last Modified: 2021-12-16 03:42 PM
Updating this post with SE security bulletin.
To mitigate Apache Log4j Vulnerability (Log4Shell) in PowerChute follow the instruction is linked security bulletin.
https://www.se.com/ww/en/download/document/SESB-2021-347-01/
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 06:50 AM
Thanks Bill,
Thats the conclusion I came to yesterday when running some tests.
Are there plans to update Powerchute to include version 16 of Log4j?
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 07:01 AM . Last Modified: 2021-12-15 07:03 AM
I tested it and installed it on one of our test servers.
To shorten it up: It is not safe!
We are here on a newer log4j but still vulnerable.
Version 2.14.1
I guess best option is rly to just block the FW port or do that 7zip thing. -.-
BTW:
Still no answer from the support...
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 07:05 AM
Bill,
I appreciate that you followed up so quickly on this matter, but I need some additional help.
The 7zip download is based in a data center Finland, which is Geo-IP blocked from all my client sites. There is - and has been - no reason for any internet traffic to route there.
Second, this statement telling everyone to install and use a third-party software program on a Windows Server. That's not something my clients will necessarily agree to.
So I'm caught between punching a hole through a client's firewall and using unsanctioned software to remove a problem - or asking, very politely, to have APC provide a less awkward solution.
Thanks!
Larry
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 07:58 AM
@LarryK Nearly all the remediations/patches for log4j require you to remove the class file from the jar file (which is a zip file) so you are going to need some sort of zip program on your machines to remedy the rest of your applications- not just Powerchute.
I would suggest downloading 7zip or hosting it internally so your clients can access. You mention client sites, so you are probably doing this via a RMM tool so you should be able to host the file on your server and then download via your rmm tool.
The alternative is to rename the file to .zip, extract the jar file using Explorer, delete the class file and then zip the files back up again using explorer.
Of course the other solution is to wait for a new version to come out. This will of course require a download at which point you are again downloading 3rd party software from the internet.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 11:17 AM
I am using version 10.0, 10.0.1, 10.0.2, 10.0.3, 10.0.4. is this vulnerable as well?
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 12:05 PM
I ran your instructions:
"c:\Program Files\7-Zip\7z.exe" d log4j-core-2.11.1.jar JndiLookup.class -r
and it seemed to process correctly. But when I re-run Github's Log4f-finder.exe program, it still reports this file as a vulnerability. Is that expected?
Results of Log4f-finder scan:
VULNERABLE: C:\Program Files (x86)\APC\PowerChute Business Edition\agent\lib\log4j-core-2.11.1.jar -> org\apache\logging\log4j\core\net\JndiManager.class [04fdd701809d17465c17c7e603b1b202: log4j 2.9.0 - 2.11.2]
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 12:23 PM
As a follow-up, I then updated to PC Business Edition 10.0.4, ran Log4f-finder.exe and it listed log4j-core-2.14.1.jar as vulnerable. So I updated that JAR file, but Log4f-finder still says it's vulnerable.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 12:30 PM
You need to remove the jndilookup.class and jndimanager.class file and not just JndiLookup.class to patch the vulnerability.
The other option (that i've not tested) would be to download 2.16 from https://www.apache.org/dyn/closer.lua/logging/log4j/2.16.0/apache-log4j-2.16.0-bin.zip
Extract and then copy log4j-core-2.16.0.jar into the C:\Program Files (x86)\APC\PowerChute Business Edition\agent\lib directory
delete log4j-core-2.14.1.jar from this directory.
My understanding is that the version number in the files doesn't matter to Java (but I could be wrong on this).
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 12:41 PM
Thanks!
Yep, after I also ran "c:\Program Files\7-Zip\7z.exe" d log4j-core-2.14.1.jar JndiManager.class -r , then Log4f-finder did not find any vulnerabilities.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 12:41 PM
I like the full jar file replacement much more than the cut-and-paste approach.
I would test this, but I'm currently on hold with APC tech support for a problem I'm experiencing with PCNS following a server reboot this past weekend (its no longer talking to the NMC...).
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 12:43 PM
This sounds like a great time to test this as it can't get any worse right?
🙂
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 12:47 PM
Seriously...
What's the worse that could happen? Support suggests reinstalling PCNS...
Once I get done with another remote support session with another vendor.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 01:07 PM
Just as another follow-up, on another server, I only ran "c:\Program Files\7-Zip\7z.exe" d log4j-core-2.14.1.jar JndiManager.class -r , then Log4f-finder did not report any vulnerabilities. So I'm not sure if that means you don't have to update the JndiLookup.class , but I still did for good measure.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 01:08 PM
While logical, simply exchanging the 2.16 for 2.13 did not work.
When starting PCNS after the replacement, the service fails to start - no error message.
Was definitely worth a shot.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 01:13 PM
Thats odd as removing JndiLookup.class is explicity mentioned at https://logging.apache.org/log4j/2.x/security.html on how to fix the issue.
Larry, - that's a shame 😞
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-15 05:22 PM . Last Modified: 2021-12-16 09:19 AM
I sent in a support request on the 12th but haven't heard back yet.
Did however also read this:
https://isc.sans.edu/diary/rss/28134
Regardless, for better or worse, this is what I have done - not sure what evil it may cause - but anyway:
1. upgraded to the newest version of the Powerchute software
2. download the latest (v2.16) log4j file from here: https://logging.apache.org/log4j/2.x/download.html
3. extracted the three corresponding files that are used by pbe agent, namely:
log4-api-2.16.0.jar
log4-core-2.16.0.jar
log4-slf4j-2.16.0.jar
4. renamed them:
log4-api-2.14.1.jar
log4-core-2.14.1.jar
log4-slf4j-2.14.1.jar
5. stopped the apc pbe agent service
6. copied the renamed files from step 4 above to
C:\Program Files (x86)\APC\PowerChute Business Edition\agent\lib
7. started the apc pbe agent service
8. signed on, everything appeared to be working ok
Just sharing, don't know if you want to do this yourself - or if it would be of any help.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-16 04:56 AM
Yes. The next releases of PCBE and PCNS will have updated log4j2. I'll post when I have release dates.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-16 11:44 AM
Hi,
I have installed version 10.0.4 of Powerchute Business Edition and in C:\Program Files (x86)\APC\PowerChute Business Edition\agent\lib, there is log4j-core-2.14.1.jar.
I dont understand this NOTE: For v10.0, 10.0.1, 10.0.2, 10.0.3, 10.0.4 replace the text in bold with log4j-core-2.11.1.jar and for v9.5 replace this with log4j-core-2.2.jar.
What command should I run?
I think, that for PBE version 10.0.4 it should be: "c:\Program Files\7-Zip\7z.exe" d log4j-core-2.14.1.jar JndiLookup.class -r
Thank you and excuse my English 🙂
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-16 12:02 PM
Hi Martin,
Yes, I also found that note confusing. I think you are correct in your conclusion. That's exactly what I ran after upgrading to v10.0.4.
But I believe they are missing another statement that needs to be run to fully mitigate the vulnerability, so I believe you also need to run this: "c:\Program Files\7-Zip\7z.exe" d log4j-core-2.14.1.jar JndiManager.class -r
If you use Github's Fox-it Log4j-finder.exe program (https://github.com/fox-it/log4j-finder ), it will keep reporting a vulnerability on that JAR file until you also fix the JndiManager.class section.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-16 12:59 PM
Hi gsoyars,
exactly as you wrote. I used Log4j-finder.exe, too and the same result as you 😞
Overall, the solution is still quite confusing.....
I hope, they will update PBE as soon as possible.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-20 09:21 AM
I was able to finally run this on our Linux PCNS device, however Tenable still reports this as being vulnerable do it being on an outdated 2.10 version of log4j.
If I did not receive any errors when running the commands should I be concerned about this?
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-22 05:33 AM
Powershell script which fixes issue with current version of Business Edition and Network shutdown.
https://github.com/chaimblack/CyberSecurity/tree/main/Log4Shell
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-22 07:28 AM
This is the simplistic solution I was looking for (albeit a week after I took some very manual steps to remediate).
Good to have for other, possibly less nefarious, problems in the future.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2021-12-28 06:07 PM
I am also seeing after running the commands posted by APC that log4j-core-2.11.1.jar is still being flagged as vulnerable. These steps appear to be incomplete.
APC, please advise.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2022-01-04 04:45 AM
Hi,
We have posted an FAQ that includes scripts to correct the vulnerability.
https://www.se.com/ww/en/faqs/FAQ000229596/
You may see that PowerChute is flagged as vulnerable after running the scripts. It is being flagged because the version number has not been updated.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Posted: 2022-01-04 06:29 AM
Seeking clarification of this statement:
Change directory to the location where you extracted the files and move to the Windows folder,
Opening an elevated Command prompt (which is explained in detail) places you in C:\Windows\system32.
The first part of the sentence says to "cd" to the folder with the extracted download. But I don't know what you mean by "move to the Windows folder". Do you mean to "cd" back to the starting location?
Thanks!
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Link copied. Please paste this link to share this article on your social media post.
Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.