Workaround available for Apache Log4Shell security vulnerability for CVE-2021-44228 and CVE-2021-45046
Issue
Defect ID | CVSS v3 rating | Description |
|---|---|---|
DRIAR-1746 | 9.8 | Apache Log4j Security Vulnerability (CVE-2021-44228 and CVE-2021-45046) is identified in BMC Helix ITSM: Smart Reporting. |
Workaround
Verify the application version
- Log in to Smart Reporting with administrator permissions.
- Navigate to Administration > System Information, as shown in the following image:

Verify the application version in the System Information screen, as shown in the following image:

Upgrade log4j in an existing Smart Reporting instance (Remediation option)
- Download log4j 2.17.0 binary distribution from the location: https://logging.apache.org/log4j/2.x/download.html.
- Stop Smart Reporting services.
- From the distribution zip file, extract the following files and copy them into <Install Directory>/WEB-INF/lib folder:
- log4j-1.2-api-2.17.0.jar
- log4j-api-2.17.0.jar
- log4j-core-2.17.0.jar
- log4j-web-2.17.0.jar
Remove the existing log4j libraries in the folder.
These files will have the same names, but with a different version number (either version 2.13.3 or 2.15.0.)- After replacing the log4j libraries, restart the Smart Reporting services.
Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*