by Jared Barraford
Managing Director
Background
Recently two critical risk Apache vulnerabilities were brought to the iManage security team for investigation, which were found to be exploitable under certain conditions for on-premises customers running specific Work products. At this time, these vulnerabilities do not apply, or have been mitigated for iManage Cloud customers with zero impact to any customer data.
What is the Impact + Mitigation for CVE-2021-40438 (Mod_Proxy)?
Some iManage on-premises products are installed with a version of Apache that is impacted by this vulnerability (all versions including and earlier than Apache HTTP Server 2.4.48 and earlier). With a vulnerable version of Apache, remote, unauthenticated attackers can force vulnerable HTTP servers to forward requests to arbitrary servers via the mod_proxy component, giving them the ability to access resources that should be unavailable.
The products potentially impacted by this issue are:
The issue can be mitigated accordingly:
*** Note Well *** iManage systems exposed to the internet through Work Anywhere should be prioritized for evaluating potential impact, however, may not be vulnerable depending on the external security configuration.
What is the Impact + Mitigation for CVE-2021-44228 (Log4j2)?
Apache Log4j2 is a logging tool used with many iManage java-based products. The vulnerability allows an attacker to control log messages or log message parameters to execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.
*** Note Well *** iManage Work Server is not impacted by this vulnerability.
The products potentially impacted by this issue are:
The issue can be mitigated by disabling message lookup substitution for each of the affected components.
Helient can offer assistance evaluating the risk and remediating these vulnerabilities or reviewing the overall state of security within the iManage environment. Please contact our experts at service@helient.com.