UrbanCode Velocity

CVE-2021-44228 aka log4shell and UrbanCode Velocity Security Bulletin Information

Summary

IBM UrbanCode Velocity is vulnerable to CVE-2021-44228, Apache Log4j 2 / Log4Shell, as the `urbancode/velocity-se-rcl-web-client` is built upon Java and leverages Apache Lo4j 2. The other IBM UrbanCode Velocity services are built upon JavaScript which use Log4js and are not affected.

Vulnerability Details

Refer to the National vulnerability database (NVD) for the most current information on the Apache Log4j 2 / Log4Shell vulnerability:

https://nvd.nist.gov/vuln/detail/CVE-2021-44228

Affected products and versions

Current maintenance levels of IBM UrbanCode Velocity are vulnerable to CVE-2021-44228.

Remediation/fixes

Please upgrade to IBM UrbanCode Velocity v2.5.1-ifix01 or greater. Follow the standard upgrade documentation found here: https://www.ibm.com/docs/en/urbancode-velocity/2.5.x?topic=upgrading-

Workarounds and Mitigations

None

References

Complete CVSS v3 Guide On-line Calculator v3

Complete CVSS v2 Guide On-line Calculator v2

The Common vulnerability scoring system (CVSS) environment score is customer environment specific and ultimately impacts the overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the References section of this security bulletin.

Related Information:

IBM Secure Engineering Web Portal

IBM Product Security Incident Response Blog

Change History:

13 Dec 2021: Initial Publication

Disclaimer:

According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “”AS IS”” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

 

Tags: