CVE-2021-34797
📋 TL;DR
Apache Geode versions up to 1.12.4 and 1.13.4 fail to properly redact sensitive information in log files when passwords or security properties begin with non-alphanumeric characters and have specific prefixes. This exposes credentials like passwords and SSL keys in logs. Organizations using vulnerable Apache Geode versions with custom password formats are affected.
💻 Affected Systems
- Apache Geode
📦 What is this software?
Geode by Apache
Geode by Apache
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain access to log files containing unredacted passwords, SSL keys, or security properties, leading to complete system compromise, data theft, or lateral movement.
Likely Case
Sensitive credentials appear in log files accessible to administrators or monitoring systems, potentially exposing them to unauthorized personnel or attackers with log access.
If Mitigated
With proper log file access controls and monitoring, exposure is limited to authorized personnel only, though credential exposure still poses risk.
🎯 Exploit Status
Exploitation requires access to log files containing the unredacted sensitive information; no authentication bypass or complex attack chain needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.12.5, 1.13.5, and 1.14.0
Vendor Advisory: https://lists.apache.org/thread/nq2w9gjzm1cjx1rh6zw41ty39qw7qpx4
Restart Required: Yes
Instructions:
1. Download and install Apache Geode version 1.12.5, 1.13.5, or 1.14.0 from the official Apache website. 2. Stop all Geode services. 3. Replace the existing installation with the patched version. 4. Restart all Geode services. 5. Verify the update by checking the version.
🔧 Temporary Workarounds
Avoid Non-Alphanumeric Password Prefixes
allEnsure all passwords and security properties do not begin with non-alphanumeric characters (e.g., avoid symbols at the start) and avoid using the vulnerable prefixes.
Restrict Log File Access
linuxImplement strict file permissions on log directories to limit access to authorized users only.
chmod 600 /path/to/geode/logs/*.log
chown geode:geode /path/to/geode/logs/*.log
🧯 If You Can't Patch
- Rotate all passwords and security properties that might have been exposed in logs, especially those with non-alphanumeric starting characters.
- Implement centralized log monitoring with alerting for any log entries containing sensitive strings like 'password' or 'ssl'.
🔍 How to Verify
Check if Vulnerable:
Check if using Apache Geode version 1.12.4 or earlier, or 1.13.4 or earlier, and review configuration for passwords/properties starting with non-alphanumeric characters and vulnerable prefixes.
Check Version:
gfsh version
Verify Fix Applied:
After patching, verify the installed version is 1.12.5, 1.13.5, or 1.14.0, and test with a sample password to confirm redaction in logs.
📡 Detection & Monitoring
Log Indicators:
- Log entries containing unredacted passwords, SSL keys, or security properties with prefixes 'sysprop-', 'javax.net.ssl', or 'security-', especially if they start with symbols.
Network Indicators:
- None specific; detection relies on log analysis.
SIEM Query:
source="apache_geode_logs" AND ("password" OR "ssl" OR "sysprop-" OR "security-") NOT "[REDACTED]"