LoginSignup
1
0

More than 1 year has passed since last update.

VCSA 6.5 で vc_log4j_mitigator.py 実行した結果

Posted at
root@photon-machine [ /tmp ]# python vc_log4j_mitigator.py -r
2021-12-22T06:48:40 INFO main: Script version: 1.6.0
2021-12-22T06:48:40 INFO main: vCenter type: Version: 6.5.0.14100; Build: 7801515; Deployment type: embedded; Gateway: False; VCHA: False; Windows: False;
2021-12-22T06:48:40 INFO main: Running in dryrun mode.
2021-12-22T06:48:43 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware/common-jars/log4j-core-2.8.jar
2021-12-22T06:48:46 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpCCMo7Y/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:46 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/websso.war
2021-12-22T06:48:46 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpY9z8qq/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:46 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/afd.war
2021-12-22T06:48:46 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmppmOYhd/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:46 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/idm.war
2021-12-22T06:48:46 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpinKtGl/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:46 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpbZALTd/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/sts.war
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpHPbvCb/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpN2HWTz/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/lookupservice/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/sts/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/websso/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/idm/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/afd/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/openidconnect/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:48 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-cm/lib/log4j-core.jar
2021-12-22T06:48:51 INFO process_jar: Found a VULNERABLE FILE: /opt/vmware/lib64/log4j-core-2.2.jar
2021-12-22T06:48:51 INFO _patch_file: Found VULNERABLE FILE: /usr/lib/vmware-vmon/java-wrapper-vmon
2021-12-22T06:48:51 INFO _patch_file: Found VULNERABLE FILE: /etc/rc.d/init.d/vmware-psc-client
2021-12-22T06:48:51 INFO _patch_file: Found VULNERABLE FILE: /etc/rc.d/init.d/vmware-stsd
2021-12-22T06:48:51 INFO _patch_file: Found VULNERABLE FILE: /etc/rc.d/init.d/vmware-sts-idmd
2021-12-22T06:48:51 INFO print_summary:
=====     Summary     =====
List of vulnerable java archive files:

/usr/lib/vmware/common-jars/log4j-core-2.8.jar
/usr/lib/vmware-sso/vmware-sts/webapps/websso.war
/usr/lib/vmware-sso/vmware-sts/webapps/afd.war
/usr/lib/vmware-sso/vmware-sts/webapps/idm.war
/usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war
/usr/lib/vmware-sso/vmware-sts/webapps/sts.war
/usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war
/usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war
/usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver/WEB-INF/lib/log4j-core-2.2.jar
/usr/lib/vmware-sso/vmware-sts/webapps/lookupservice/WEB-INF/lib/log4j-core-2.2.jar
/usr/lib/vmware-sso/vmware-sts/webapps/sts/WEB-INF/lib/log4j-core-2.2.jar
/usr/lib/vmware-sso/vmware-sts/webapps/websso/WEB-INF/lib/log4j-core-2.2.jar
/usr/lib/vmware-sso/vmware-sts/webapps/idm/WEB-INF/lib/log4j-core-2.2.jar
/usr/lib/vmware-sso/vmware-sts/webapps/afd/WEB-INF/lib/log4j-core-2.2.jar
/usr/lib/vmware-sso/vmware-sts/webapps/openidconnect/WEB-INF/lib/log4j-core-2.2.jar
/usr/lib/vmware-cm/lib/log4j-core.jar
/opt/vmware/lib64/log4j-core-2.2.jar

List of vulnerable configuration files:

/usr/lib/vmware-vmon/java-wrapper-vmon
/etc/rc.d/init.d/vmware-psc-client
/etc/rc.d/init.d/vmware-stsd
/etc/rc.d/init.d/vmware-sts-idmd

Total found: 21
Log file: /var/log/vmsa-2021-0028_2021_12_22_06_48_40.log
===========================
2021-12-22T06:48:51 INFO main: Done.
root@photon-machine [ /tmp ]# python vc_log4j_mitigator.py
2021-12-22T06:49:07 INFO main: Script version: 1.6.0
2021-12-22T06:49:07 INFO main: vCenter type: Version: 6.5.0.14100; Build: 7801515; Deployment type: embedded; Gateway: False; VCHA: False; Windows: False;
A service stop and start is required to complete this operation.  Continue?[y]y
2021-12-22T06:49:22 INFO stop: stopping services
2021-12-22T06:51:30 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware/common-jars/log4j-core-2.8.jar
2021-12-22T06:51:30 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware/common-jars/log4j-core-2.8.jar backed up to /tmp/tmpM3pWe8/usr/lib/vmware/common-jars/log4j-core-2.8.jar.bak
2021-12-22T06:51:30 INFO process_jar: VULNERABLE FILE: /usr/lib/vmware/common-jars/log4j-core-2.8.jar backed up to /tmp/tmpM3pWe8/usr/lib/vmware/common-jars/log4j-core-2.8.jar.bak
2021-12-22T06:51:33 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmp8bQh0w/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:51:33 INFO backup_file: VULNERABLE FILE: /tmp/tmp8bQh0w/WEB-INF/lib/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/tmp/tmp8bQh0w/WEB-INF/lib/log4j-core-2.2.jar.bak
2021-12-22T06:51:33 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/websso.war
2021-12-22T06:51:33 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/websso.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/websso.war.bak
2021-12-22T06:51:33 INFO process_war: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/websso.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/websso.war.bak
2021-12-22T06:51:33 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpl4pjkL/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:51:33 INFO backup_file: VULNERABLE FILE: /tmp/tmpl4pjkL/WEB-INF/lib/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/tmp/tmpl4pjkL/WEB-INF/lib/log4j-core-2.2.jar.bak
2021-12-22T06:51:33 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/afd.war
2021-12-22T06:51:33 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/afd.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/afd.war.bak
2021-12-22T06:51:33 INFO process_war: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/afd.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/afd.war.bak
2021-12-22T06:51:33 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmp3bSH2b/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:51:33 INFO backup_file: VULNERABLE FILE: /tmp/tmp3bSH2b/WEB-INF/lib/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/tmp/tmp3bSH2b/WEB-INF/lib/log4j-core-2.2.jar.bak
2021-12-22T06:51:34 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/idm.war
2021-12-22T06:51:34 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/idm.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/idm.war.bak
2021-12-22T06:51:34 INFO process_war: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/idm.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/idm.war.bak
2021-12-22T06:51:34 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpSxDSpV/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:51:34 INFO backup_file: VULNERABLE FILE: /tmp/tmpSxDSpV/WEB-INF/lib/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/tmp/tmpSxDSpV/WEB-INF/lib/log4j-core-2.2.jar.bak
2021-12-22T06:51:34 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war
2021-12-22T06:51:34 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war.bak
2021-12-22T06:51:34 INFO process_war: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war.bak
2021-12-22T06:51:34 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpYF1oVe/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:51:34 INFO backup_file: VULNERABLE FILE: /tmp/tmpYF1oVe/WEB-INF/lib/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/tmp/tmpYF1oVe/WEB-INF/lib/log4j-core-2.2.jar.bak
2021-12-22T06:51:34 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/sts.war
2021-12-22T06:51:34 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/sts.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/sts.war.bak
2021-12-22T06:51:34 INFO process_war: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/sts.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/sts.war.bak
2021-12-22T06:51:34 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpC0lqK9/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:51:34 INFO backup_file: VULNERABLE FILE: /tmp/tmpC0lqK9/WEB-INF/lib/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/tmp/tmpC0lqK9/WEB-INF/lib/log4j-core-2.2.jar.bak
2021-12-22T06:51:35 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war
2021-12-22T06:51:35 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war.bak
2021-12-22T06:51:35 INFO process_war: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war.bak
2021-12-22T06:51:35 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpuKhXpn/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:51:35 INFO backup_file: VULNERABLE FILE: /tmp/tmpuKhXpn/WEB-INF/lib/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/tmp/tmpuKhXpn/WEB-INF/lib/log4j-core-2.2.jar.bak
2021-12-22T06:51:35 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war
2021-12-22T06:51:35 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war.bak
2021-12-22T06:51:35 INFO process_war: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war.bak
2021-12-22T06:51:35 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-cm/lib/log4j-core.jar
2021-12-22T06:51:35 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-cm/lib/log4j-core.jar backed up to /tmp/tmpM3pWe8/usr/lib/vmware-cm/lib/log4j-core.jar.bak
2021-12-22T06:51:35 INFO process_jar: VULNERABLE FILE: /usr/lib/vmware-cm/lib/log4j-core.jar backed up to /tmp/tmpM3pWe8/usr/lib/vmware-cm/lib/log4j-core.jar.bak
2021-12-22T06:51:36 INFO process_jar: Found a VULNERABLE FILE: /opt/vmware/lib64/log4j-core-2.2.jar
2021-12-22T06:51:36 INFO backup_file: VULNERABLE FILE: /opt/vmware/lib64/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/opt/vmware/lib64/log4j-core-2.2.jar.bak
2021-12-22T06:51:36 INFO process_jar: VULNERABLE FILE: /opt/vmware/lib64/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/opt/vmware/lib64/log4j-core-2.2.jar.bak
2021-12-22T06:51:36 INFO _patch_file: Found VULNERABLE FILE: /usr/lib/vmware-vmon/java-wrapper-vmon
2021-12-22T06:51:36 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-vmon/java-wrapper-vmon backed up to /tmp/tmpM3pWe8/usr/lib/vmware-vmon/java-wrapper-vmon.bak
2021-12-22T06:51:36 INFO _patch_file: Found VULNERABLE FILE: /etc/rc.d/init.d/vmware-psc-client
2021-12-22T06:51:36 INFO backup_file: VULNERABLE FILE: /etc/rc.d/init.d/vmware-psc-client backed up to /tmp/tmpM3pWe8/etc/rc.d/init.d/vmware-psc-client.bak
2021-12-22T06:51:36 INFO _patch_file: Found VULNERABLE FILE: /etc/rc.d/init.d/vmware-stsd
2021-12-22T06:51:36 INFO backup_file: VULNERABLE FILE: /etc/rc.d/init.d/vmware-stsd backed up to /tmp/tmpM3pWe8/etc/rc.d/init.d/vmware-stsd.bak
2021-12-22T06:51:36 INFO _patch_file: Found VULNERABLE FILE: /etc/rc.d/init.d/vmware-sts-idmd
2021-12-22T06:51:36 INFO backup_file: VULNERABLE FILE: /etc/rc.d/init.d/vmware-sts-idmd backed up to /tmp/tmpM3pWe8/etc/rc.d/init.d/vmware-sts-idmd.bak
2021-12-22T06:51:36 INFO print_summary:
=====     Summary     =====
Backup Directory: /tmp/tmpM3pWe8
List of processed java archive files:

/usr/lib/vmware/common-jars/log4j-core-2.8.jar
/usr/lib/vmware-sso/vmware-sts/webapps/websso.war
/usr/lib/vmware-sso/vmware-sts/webapps/afd.war
/usr/lib/vmware-sso/vmware-sts/webapps/idm.war
/usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war
/usr/lib/vmware-sso/vmware-sts/webapps/sts.war
/usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war
/usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war
/usr/lib/vmware-cm/lib/log4j-core.jar
/opt/vmware/lib64/log4j-core-2.2.jar

List of processed configuration files:

/usr/lib/vmware-vmon/java-wrapper-vmon
/etc/rc.d/init.d/vmware-psc-client
/etc/rc.d/init.d/vmware-stsd
/etc/rc.d/init.d/vmware-sts-idmd

Total fixed: 14

    NOTE: Running this script again with the --dryrun
    flag should now yield 0 vulnerable files.

Log file: /var/log/vmsa-2021-0028_2021_12_22_06_49_07.log
===========================
2021-12-22T06:51:36 INFO start: starting services
2021-12-22T07:02:15 ERROR run_command: RC = 1
Stdout = Perform start operation. vmon_profile=ALL, svc_names=None, include_coreossvcs=True, include_leafossvcs=True
2021-12-22T06:51:36.811Z   Running command: ['/usr/bin/systemctl', 'is-enabled', u'lwsmd']
2021-12-22T06:51:36.813Z   Done running command
2021-12-22T06:51:36.815Z   Service lwsmd does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:36.815Z   Running command: ['/sbin/service', u'lwsmd', 'status']
2021-12-22T06:51:36.831Z   Done running command
2021-12-22T06:51:36.834Z   Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:36.887Z   Done running command
2021-12-22T06:51:36.888Z   Running command: ['/usr/bin/systemctl', 'set-property', u'lwsmd.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:36.890Z   Done running command
Successfully started service lwsmd
2021-12-22T06:51:37.207Z   Running command: ['/usr/bin/systemctl', 'is-enabled', u'vmafdd']
2021-12-22T06:51:37.212Z   Done running command
2021-12-22T06:51:37.217Z   Service vmafdd does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:37.217Z   Running command: ['/sbin/service', u'vmafdd', 'status']
2021-12-22T06:51:37.233Z   Done running command
2021-12-22T06:51:37.235Z   Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:37.297Z   Done running command
2021-12-22T06:51:37.297Z   Running command: ['/usr/bin/systemctl', 'set-property', u'vmafdd.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:37.300Z   Done running command
Successfully started service vmafdd
2021-12-22T06:51:37.680Z   Running command: ['/usr/bin/systemctl', 'is-enabled', u'vmdird']
2021-12-22T06:51:37.684Z   Done running command
2021-12-22T06:51:37.685Z   Service vmdird does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:37.686Z   Running command: ['/sbin/service', u'vmdird', 'status']
2021-12-22T06:51:37.702Z   Done running command
2021-12-22T06:51:37.705Z   Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:37.773Z   Done running command
2021-12-22T06:51:37.773Z   Running command: ['/usr/bin/systemctl', 'set-property', u'vmdird.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:37.776Z   Done running command
Successfully started service vmdird
2021-12-22T06:51:40.067Z   Running command: ['/usr/bin/systemctl', 'is-enabled', u'vmcad']
2021-12-22T06:51:40.080Z   Done running command
2021-12-22T06:51:40.082Z   Service vmcad does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:40.083Z   Running command: ['/sbin/service', u'vmcad', 'status']
2021-12-22T06:51:40.100Z   Done running command
2021-12-22T06:51:40.102Z   Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:40.154Z   Done running command
2021-12-22T06:51:40.154Z   Running command: ['/usr/bin/systemctl', 'set-property', u'vmcad.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:40.158Z   Done running command
Successfully started service vmcad
2021-12-22T06:51:41.321Z   Running command: ['/usr/bin/systemctl', 'is-enabled', u'vmware-sts-idmd']
2021-12-22T06:51:41.324Z   Done running command
2021-12-22T06:51:41.326Z   Service vmware-sts-idmd does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:41.326Z   Running command: ['/sbin/service', u'vmware-sts-idmd', 'status']
2021-12-22T06:51:41.342Z   Done running command
2021-12-22T06:51:41.344Z   Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:41.392Z   Done running command
2021-12-22T06:51:41.392Z   Running command: ['/usr/bin/systemctl', 'set-property', u'vmware-sts-idmd.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:41.395Z   Done running command
Successfully started service vmware-sts-idmd
2021-12-22T06:51:42.575Z   Running command: ['/usr/bin/systemctl', 'is-enabled', u'vmware-stsd']
2021-12-22T06:51:42.580Z   Done running command
2021-12-22T06:51:42.584Z   Service vmware-stsd does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:42.584Z   Running command: ['/sbin/service', u'vmware-stsd', 'status']
2021-12-22T06:51:42.615Z   Done running command
2021-12-22T06:51:42.618Z   Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:42.665Z   Done running command
2021-12-22T06:51:42.665Z   Running command: ['/usr/bin/systemctl', 'set-property', u'vmware-stsd.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:42.669Z   Done running command
Successfully started service vmware-stsd
2021-12-22T06:51:54.897Z   Running command: ['/usr/bin/systemctl', 'is-enabled', u'vmdnsd']
2021-12-22T06:51:54.902Z   Done running command
2021-12-22T06:51:54.904Z   Service vmdnsd does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:54.904Z   Running command: ['/sbin/service', u'vmdnsd', 'status']
2021-12-22T06:51:54.919Z   Done running command
Successfully started service vmdnsd
2021-12-22T06:51:54.922Z   Running command: ['/usr/bin/systemctl', 'is-enabled', u'vmware-psc-client']
2021-12-22T06:51:54.926Z   Done running command
2021-12-22T06:51:54.928Z   Service vmware-psc-client does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:54.928Z   Running command: ['/sbin/service', u'vmware-psc-client', 'status']
2021-12-22T06:51:54.944Z   Done running command
2021-12-22T06:51:54.946Z   Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:54.994Z   Done running command
2021-12-22T06:51:54.995Z   Running command: ['/usr/bin/systemctl', 'set-property', u'vmware-psc-client.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:54.998Z   Done running command
Successfully started service vmware-psc-client
2021-12-22T06:51:57.260Z   Running command: ['/usr/bin/systemctl', 'set-environment', 'VMON_PROFILE=NONE']
2021-12-22T06:51:57.263Z   Done running command
2021-12-22T06:51:57.265Z   Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:57.344Z   Done running command
2021-12-22T06:51:57.353Z   Running command: ['/usr/bin/systemctl', 'set-property', u'vmware-vmon.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:57.362Z   Done running command
2021-12-22T06:51:58.545Z   Running command: ['/usr/bin/systemctl', 'unset-environment', 'VMON_PROFILE']
2021-12-22T06:51:58.548Z   Done running command

Stderr = Service-control failed. Error Failed to start vmon services.vmon-cli RC=2, stderr=Failed to start vsphere-ui services. Error: Service crashed while starting


2021-12-22T07:02:15 ERROR start: error occurred while trying to start services
root@photon-machine [ /tmp ]# python vc_log4j_mitigator.py -r
2021-12-22T07:13:46 INFO main: Script version: 1.6.0
2021-12-22T07:13:46 INFO main: vCenter type: Version: 6.5.0.14100; Build: 7801515; Deployment type: embedded; Gateway: False; VCHA: False; Windows: False;
2021-12-22T07:13:46 INFO main: Running in dryrun mode.
2021-12-22T07:13:57 INFO print_summary:
=====     Summary     =====

No vulnerable files found!

Total found: 0
Log file: /var/log/vmsa-2021-0028_2021_12_22_07_13_46.log
===========================
2021-12-22T07:13:57 INFO main: Done.
root@photon-machine [ /tmp ]#
1
0
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
1
0