<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>article CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Compose for Data Lakes in Official Support Articles</title>
    <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869987</link>
    <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;Qlik is providing these mitigation steps as a temporary measure. A patch will be provided and linked here; customers are advised to move to the patch as soon as it is available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;LI-PRODUCT title="Qlik Compose for Data Lakes" id="qlikCompose"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation steps to follow Compose for Data Lakes log4j vulnerability:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation - Windows Service&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&amp;nbsp;Edit the file&amp;nbsp;&lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;\Compose for Data Lakes\java\bin\acjs.bat&amp;nbsp;&lt;/FONT&gt;(&lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;&lt;/FONT&gt; typically refers to &lt;FONT face="courier new,courier"&gt;C:\Program Files\Attunity&lt;/FONT&gt;)&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;Add the command&amp;nbsp;set &lt;STRONG&gt;&lt;FONT face="courier new,courier" color="#FF0000"&gt;LOG4J_FORMAT_MSG_NO_LOOKUPS=TRUE&lt;/FONT&gt;&lt;/STRONG&gt;&amp;nbsp; in the location shown below (script line before last):&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;REM Attunity Compose Java Server configuration/run script&lt;BR /&gt;REM e.g. AT_PROD = C:\Program Files\Attunity\Compose\java_server&lt;BR /&gt;for %%A in ("%~dp0..") do set AT_PROD=%%~fA&lt;BR /&gt;REM list plugins here&lt;BR /&gt;SET AT_PLUGIN_LIST=-plugins compose_ctl&lt;BR /&gt;REM set data directory based on the name of this script&lt;BR /&gt;set AT_DATA_SUFFIX=&lt;BR /&gt;for /F "tokens=2 delims=_" %%A in ("%~n0") do set AT_DATA_SUFFIX=%%A&lt;BR /&gt;if "%AT_DATA_SUFFIX%" == "" (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; set AT_DATA=&lt;BR /&gt;) else (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; set AT_DATA=-d data_%AT_DATA_SUFFIX%&lt;BR /&gt;)&lt;BR /&gt;if "%COMPOSE_JAVA_SERVER_DEBUG%" == "true" (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; set &amp;nbsp;JVM_REMOTE_DEBUG_ARGUMENTS=-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=127.0.0.1:5005&lt;BR /&gt;)else (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; set JVM_REMOTE_DEBUG_ARGUMENTS=&lt;BR /&gt;)&lt;BR /&gt;SET AT_JAVA=%AT_PROD%\lib\jre\bin\java.exe&lt;BR /&gt;SET AT_EXTERNAL=%AT_PROD%\external&lt;BR /&gt;SET AT_LIB=%AT_PROD%\lib&lt;BR /&gt;SET AT_PLUGINS=%AT_PROD%\plugins&lt;BR /&gt;SET AT_MAIN=com.attunity.infrastructure.server.PluginServer&lt;BR /&gt;SET AT_EXTERNAL_JDBC_PATH=%AT_PROD%\jdbc&lt;BR /&gt;SET AT_APP_NAME=-DQlikApp=ComposeJavaServer&lt;BR /&gt;&lt;BR /&gt;&amp;lt;--------------------- Fix Here---------------------&amp;gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;SET LOG4J_FORMAT_MSG_NO_LOOKUPS=TRUE&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;"%AT_JAVA%" %AT_APP_NAME% %JVM_REMOTE_DEBUG_ARGUMENTS% -cp "%AT_EXTERNAL_JDBC_PATH%"/*;"%AT_PLUGINS%"/*;"%AT_EXTERNAL%"/*;"%AT_LIB%"/* %AT_MAIN% %AT_DATA% %AT_PLUGIN_LIST% %*&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;SPAN&gt;Save the file.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;SPAN&gt;Locate the vulnerable log4j-core-&amp;lt;version#&amp;gt;.jar file and rename it to log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;LI-CODE lang="markup"&gt;$ cd &amp;lt;installation-root&amp;gt;\Compose\java\external

$ ren log4j-core-&amp;lt;version#&amp;gt;.jar  ..\log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Download the non-vulnerable jar named&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;log4j-core-nolookup-&amp;lt;version#&amp;gt;.jar&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp; from this page and place it in the same location as the vulnerable jar.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Restart the Compose for Data Lakes Windows service.&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;$ sc stop AttunityComposeForDataLakes&lt;BR /&gt;&lt;BR /&gt;$ sc start AttunityComposeForDataLakes&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that if you have a customized Compose for Data Lakes start script, you should perform the equivalent edit on your modified start script.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation – Remote Compose Agent on Hadoop&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Customers using Compose for Data Lakes using Spark projects with a remote Compose agent running on their Hadoop cluster should follow the mitigation for the Windows service, as detailed above. Additionally, they will need to apply another mitigation for the remote Compose agent running on Hadoop. &lt;FONT color="#FF0000"&gt;The certification and the details for this mitigation are not yet ready and will be published in the coming days. Monitor the support blog or knowledge base in the Qlik community for an updated version of this document.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;For more information on the Log4j vulnerability, please visit the &lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368" target="_blank" rel="noopener"&gt;Support Updates Blog&lt;/A&gt; post.&lt;/FONT&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
    <pubDate>Fri, 17 Dec 2021 21:05:44 GMT</pubDate>
    <dc:creator>Jamie_Gregory</dc:creator>
    <dc:date>2021-12-17T21:05:44Z</dc:date>
    <item>
      <title>CVE_2021_44228 - Handling the log4j lookups critical vulnerability for Qlik Compose for Data Lakes</title>
      <link>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869987</link>
      <description>&lt;DIV class="lia-message-template-content-zone"&gt;
&lt;P&gt;Qlik is providing these mitigation steps as a temporary measure. A patch will be provided and linked here; customers are advised to move to the patch as soon as it is available.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Environment:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;LI-PRODUCT title="Qlik Compose for Data Lakes" id="qlikCompose"&gt;&lt;/LI-PRODUCT&gt;&amp;nbsp;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H3&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation steps to follow Compose for Data Lakes log4j vulnerability:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H3&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation - Windows Service&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&amp;nbsp;Edit the file&amp;nbsp;&lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;\Compose for Data Lakes\java\bin\acjs.bat&amp;nbsp;&lt;/FONT&gt;(&lt;FONT face="courier new,courier"&gt;&amp;lt;installation-root&amp;gt;&lt;/FONT&gt; typically refers to &lt;FONT face="courier new,courier"&gt;C:\Program Files\Attunity&lt;/FONT&gt;)&lt;/LI&gt;
&lt;LI&gt;&amp;nbsp;Add the command&amp;nbsp;set &lt;STRONG&gt;&lt;FONT face="courier new,courier" color="#FF0000"&gt;LOG4J_FORMAT_MSG_NO_LOOKUPS=TRUE&lt;/FONT&gt;&lt;/STRONG&gt;&amp;nbsp; in the location shown below (script line before last):&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;REM Attunity Compose Java Server configuration/run script&lt;BR /&gt;REM e.g. AT_PROD = C:\Program Files\Attunity\Compose\java_server&lt;BR /&gt;for %%A in ("%~dp0..") do set AT_PROD=%%~fA&lt;BR /&gt;REM list plugins here&lt;BR /&gt;SET AT_PLUGIN_LIST=-plugins compose_ctl&lt;BR /&gt;REM set data directory based on the name of this script&lt;BR /&gt;set AT_DATA_SUFFIX=&lt;BR /&gt;for /F "tokens=2 delims=_" %%A in ("%~n0") do set AT_DATA_SUFFIX=%%A&lt;BR /&gt;if "%AT_DATA_SUFFIX%" == "" (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; set AT_DATA=&lt;BR /&gt;) else (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; set AT_DATA=-d data_%AT_DATA_SUFFIX%&lt;BR /&gt;)&lt;BR /&gt;if "%COMPOSE_JAVA_SERVER_DEBUG%" == "true" (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; set &amp;nbsp;JVM_REMOTE_DEBUG_ARGUMENTS=-agentlib:jdwp=transport=dt_socket,server=y,suspend=n,address=127.0.0.1:5005&lt;BR /&gt;)else (&lt;BR /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; set JVM_REMOTE_DEBUG_ARGUMENTS=&lt;BR /&gt;)&lt;BR /&gt;SET AT_JAVA=%AT_PROD%\lib\jre\bin\java.exe&lt;BR /&gt;SET AT_EXTERNAL=%AT_PROD%\external&lt;BR /&gt;SET AT_LIB=%AT_PROD%\lib&lt;BR /&gt;SET AT_PLUGINS=%AT_PROD%\plugins&lt;BR /&gt;SET AT_MAIN=com.attunity.infrastructure.server.PluginServer&lt;BR /&gt;SET AT_EXTERNAL_JDBC_PATH=%AT_PROD%\jdbc&lt;BR /&gt;SET AT_APP_NAME=-DQlikApp=ComposeJavaServer&lt;BR /&gt;&lt;BR /&gt;&amp;lt;--------------------- Fix Here---------------------&amp;gt;&lt;BR /&gt;&lt;FONT color="#FF0000"&gt;&lt;STRONG&gt;SET LOG4J_FORMAT_MSG_NO_LOOKUPS=TRUE&lt;/STRONG&gt;&lt;/FONT&gt;&lt;BR /&gt;"%AT_JAVA%" %AT_APP_NAME% %JVM_REMOTE_DEBUG_ARGUMENTS% -cp "%AT_EXTERNAL_JDBC_PATH%"/*;"%AT_PLUGINS%"/*;"%AT_EXTERNAL%"/*;"%AT_LIB%"/* %AT_MAIN% %AT_DATA% %AT_PLUGIN_LIST% %*&lt;/PRE&gt;
&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;SPAN&gt;Save the file.&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;&lt;SPAN&gt;Locate the vulnerable log4j-core-&amp;lt;version#&amp;gt;.jar file and rename it to log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable.&lt;BR /&gt;&lt;/SPAN&gt;&lt;/SPAN&gt;&lt;LI-CODE lang="markup"&gt;$ cd &amp;lt;installation-root&amp;gt;\Compose\java\external

$ ren log4j-core-&amp;lt;version#&amp;gt;.jar  ..\log4j-core-&amp;lt;version#&amp;gt;.jar-vulnerable&lt;/LI-CODE&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;SPAN&gt;Download the non-vulnerable jar named&amp;nbsp;&lt;/SPAN&gt;&lt;CODE&gt;log4j-core-nolookup-&amp;lt;version#&amp;gt;.jar&lt;/CODE&gt;&lt;SPAN&gt;&amp;nbsp; from this page and place it in the same location as the vulnerable jar.&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Restart the Compose for Data Lakes Windows service.&lt;BR /&gt;&lt;BR /&gt;
&lt;PRE&gt;$ sc stop AttunityComposeForDataLakes&lt;BR /&gt;&lt;BR /&gt;$ sc start AttunityComposeForDataLakes&lt;/PRE&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Note that if you have a customized Compose for Data Lakes start script, you should perform the equivalent edit on your modified start script.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4&gt;&lt;FONT color="#339966"&gt;&lt;STRONG&gt;Mitigation – Remote Compose Agent on Hadoop&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Customers using Compose for Data Lakes using Spark projects with a remote Compose agent running on their Hadoop cluster should follow the mitigation for the Windows service, as detailed above. Additionally, they will need to apply another mitigation for the remote Compose agent running on Hadoop. &lt;FONT color="#FF0000"&gt;The certification and the details for this mitigation are not yet ready and will be published in the coming days. Monitor the support blog or knowledge base in the Qlik community for an updated version of this document.&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#000000"&gt;For more information on the Log4j vulnerability, please visit the &lt;A href="https://community.qlik.com/t5/Support-Updates-Blog/Vulnerability-Testing-Apache-Log4j-reference-CVE-2021-44228-also/ba-p/1869368" target="_blank" rel="noopener"&gt;Support Updates Blog&lt;/A&gt; post.&lt;/FONT&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Fri, 17 Dec 2021 21:05:44 GMT</pubDate>
      <guid>https://community.qlik.com/t5/Official-Support-Articles/CVE-2021-44228-Handling-the-log4j-lookups-critical-vulnerability/ta-p/1869987</guid>
      <dc:creator>Jamie_Gregory</dc:creator>
      <dc:date>2021-12-17T21:05:44Z</dc:date>
    </item>
  </channel>
</rss>

