Difference between revisions of "CVE-2021-44228"

From IVS Wiki
Jump to: navigation, search
(Created page with " '''WARNING: The steps below outline using an automated script to update the VALT appliance. It is designed to be used on standard Valt appliances. # Log into the Valt appli...")
 
Line 1: Line 1:
  
'''WARNING: The steps below outline using an automated script to update the VALT appliance. It is designed to be used on standard Valt appliances.  
+
 
 +
'''WARNING: The steps below outline using an automated script to update the VALT appliance. It is designed to be used on standard Valt appliances.'''
 +
 
 +
'''WARNING: This applies to VALT 5.5 - 5.5.8. DO NOT PERFORM THESE STEPS ON ANY OTHER VERSION!!
  
 
# Log into the Valt appliance via SSH or the terminal
 
# Log into the Valt appliance via SSH or the terminal

Revision as of 14:54, 13 December 2021


WARNING: The steps below outline using an automated script to update the VALT appliance. It is designed to be used on standard Valt appliances.

WARNING: This applies to VALT 5.5 - 5.5.8. DO NOT PERFORM THESE STEPS ON ANY OTHER VERSION!!

  1. Log into the Valt appliance via SSH or the terminal
  2. Type in the following, followed by pressing Enter: wget https://ivs.box.com/shared/static/w78x8elhkxgxmqgge1w4az1npc7sw6za.gz -O log4j.tar.gz
    Log4j1.png
  3. Type in the following, followed by pressing Enter: tar -xvf log4j.tar.gz
    Log4j2.png
  4. Type in the following, followed by pressing Enter: cd log4j
  5. Type in the following, followed by pressing Enter: sudo ./log4j.sh
  6. Enter the password if prompted.
    Log4j3.png
  7. The vulnerability has now been patched.