Skip to content
DataMiner DoJo

More results...

Generic selectors
Exact matches only
Search in title
Search in content
Post Type Selectors
Search in posts
Search in pages
Search in posts
Search in pages
Log in
Menu
  • Blog
  • Questions
  • Learning
    • E-learning Courses
    • Empower Replay: Limited Edition
    • Tutorials
    • Open Classroom Training
    • Certification
      • DataMiner Fundamentals
      • DataMiner Configurator
      • DataMiner Automation
      • Scripts & Connectors Developer: HTTP Basics
      • Scripts & Connectors Developer: SNMP Basics
      • Visual Overview – Level 1
      • Verify a certificate
    • Video Library
    • Books We Like
    • >> Go to DataMiner Docs
  • Expert Center
    • Solutions & Use Cases
      • Solutions
      • Use Case Library
    • Markets & Industries
      • Media production
      • Government & defense
      • Content distribution
      • Service providers
      • Partners
      • OSS/BSS
    • DataMiner Insights
      • Security
      • System Architecture
      • DataMiner Releases & Updates
    • Agile
      • Agile Webspace
      • Everything Agile
        • The Agile Manifesto
        • Best Practices
        • Retro Recipes
      • Methodologies
        • The Scrum Framework
        • Kanban
        • Extreme Programming
      • Roles
        • The Product Owner
        • The Agile Coach
        • The Quality & UX Coach (QX)
    • DataMiner DevOps Professional Program
  • Downloads
  • More
    • Feature Suggestions
    • Climb the leaderboard!
    • Swag Shop
    • Contact
      • General Inquiries
      • DataMiner DevOps Support
      • Commercial Requests
    • Global Feedback Survey
  • PARTNERS
    • All Partners
    • Technology Partners
    • Strategic Partner Program
    • Deal Registration
  • >> Go to dataminer.services

Log4Shell vulnerability

Solved1.10K views4th January 2022
0
Arunkrishna Shreeder [SLC] [DevOps Advocate]4.01K 3rd January 2022 0 Comments

Hi Dojo,

We have a DMA running Cassandra but not Elastic. A vulnerability scanning tool is installed on the server and it detected a critical issue of Apache Log4j Unsupported Version Detection.

If DataMiner/Cassandra is not affected, then may I ask why is the Log4j present on the report in this case ? Thanks in advance.

Arunkrishna Shreeder [SLC] [DevOps Advocate] Selected answer as best 4th January 2022

1 Answer

  • Active
  • Voted
  • Newest
  • Oldest
5
Gellynck Jens [SLC]2.71K Posted 3rd January 2022 3 Comments

Hi Arunkrishna,

The presence of Log4J does not necessarily mean the vulnerability is present, the vulnerability is present in versions 2.0 through 2.16. Log4J version 1.X does not contain the vulnerability. From the error it looks like an older version of Log4J is present, can you check which version?

The vulnerability is only present when the log4j-core-2.X.X.jar file exists in the Cassandra or Elasticsearch installation folders (other filenames may contain “log4j” but are not subject to Log4Shell).

We have contacted the Cassandra support team and they confirmed the vulnerability was not present.

Arunkrishna Shreeder [SLC] [DevOps Advocate] Selected answer as best 4th January 2022
Arunkrishna Shreeder [SLC] [DevOps Advocate] commented 3rd January 2022

Hi Jens, we have this :
Apache Log4j 1.2 JMSAppender Remote Code Execution (CVE-2021-4104).
“Upgrade to Apache Log4j version 2.16.0 or later since 1.x is end of life.

Upgrading to the latest versions for Apache Log4j is highly recommended as intermediate versions / patches have known high severity vulnerabilities and the vendor is updating their advisories often as new research and knowledge about the impact of Log4j is discovered. Refer to https://logging.apache.org/log4j/2.x/security.html for the latest
versions.”

does this mean we need to upgrade Apache Log4j ?

Gellynck Jens [SLC] commented 3rd January 2022

CVE-2021-4104: Note this issue only affects Log4j 1.2 when specifically configured to use JMSAppender, which is not the default.

Cassandra is not configured to use the JMSAppender so this vulnerability is not exploitable. You can manually verify this by verifying JMSAppender is not used in the logback.xml & logback-tools.xml files located in C:Program FilesCassandraconf

I would not recommend updating Log4J. Instead, we should upgrade Cassandra itself, we will provide a guide for this.

Arunkrishna Shreeder [SLC] [DevOps Advocate] commented 4th January 2022

Thank you, please let me know on how to proceed on this. 🙂

Please login to be able to comment or post an answer.

My DevOps rank

DevOps Members get more insights on their profile page.

My user earnings

0 Dojo credits

Spend your credits in our swag shop.

0 Reputation points

Boost your reputation, climb the leaderboard.

Promo banner DataMiner DevOps Professiona Program
DataMiner Integration Studio (DIS)
Empower Katas
Privacy Policy • Terms & Conditions • Contact

© 2025 Skyline Communications. All rights reserved.

DOJO Q&A widget

Can't find what you need?

? Explore the Q&A DataMiner Docs