root@photon-machine [ /tmp ]# python vc_log4j_mitigator.py -r
2021-12-22T06:48:40 INFO main: Script version: 1.6.0
2021-12-22T06:48:40 INFO main: vCenter type: Version: 6.5.0.14100; Build: 7801515; Deployment type: embedded; Gateway: False; VCHA: False; Windows: False;
2021-12-22T06:48:40 INFO main: Running in dryrun mode.
2021-12-22T06:48:43 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware/common-jars/log4j-core-2.8.jar
2021-12-22T06:48:46 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpCCMo7Y/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:46 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/websso.war
2021-12-22T06:48:46 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpY9z8qq/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:46 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/afd.war
2021-12-22T06:48:46 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmppmOYhd/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:46 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/idm.war
2021-12-22T06:48:46 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpinKtGl/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:46 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpbZALTd/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/sts.war
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpHPbvCb/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpN2HWTz/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/lookupservice/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/sts/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/websso/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/idm/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/afd/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:47 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/openidconnect/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:48:48 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-cm/lib/log4j-core.jar
2021-12-22T06:48:51 INFO process_jar: Found a VULNERABLE FILE: /opt/vmware/lib64/log4j-core-2.2.jar
2021-12-22T06:48:51 INFO _patch_file: Found VULNERABLE FILE: /usr/lib/vmware-vmon/java-wrapper-vmon
2021-12-22T06:48:51 INFO _patch_file: Found VULNERABLE FILE: /etc/rc.d/init.d/vmware-psc-client
2021-12-22T06:48:51 INFO _patch_file: Found VULNERABLE FILE: /etc/rc.d/init.d/vmware-stsd
2021-12-22T06:48:51 INFO _patch_file: Found VULNERABLE FILE: /etc/rc.d/init.d/vmware-sts-idmd
2021-12-22T06:48:51 INFO print_summary:
===== Summary =====
List of vulnerable java archive files:
/usr/lib/vmware/common-jars/log4j-core-2.8.jar
/usr/lib/vmware-sso/vmware-sts/webapps/websso.war
/usr/lib/vmware-sso/vmware-sts/webapps/afd.war
/usr/lib/vmware-sso/vmware-sts/webapps/idm.war
/usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war
/usr/lib/vmware-sso/vmware-sts/webapps/sts.war
/usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war
/usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war
/usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver/WEB-INF/lib/log4j-core-2.2.jar
/usr/lib/vmware-sso/vmware-sts/webapps/lookupservice/WEB-INF/lib/log4j-core-2.2.jar
/usr/lib/vmware-sso/vmware-sts/webapps/sts/WEB-INF/lib/log4j-core-2.2.jar
/usr/lib/vmware-sso/vmware-sts/webapps/websso/WEB-INF/lib/log4j-core-2.2.jar
/usr/lib/vmware-sso/vmware-sts/webapps/idm/WEB-INF/lib/log4j-core-2.2.jar
/usr/lib/vmware-sso/vmware-sts/webapps/afd/WEB-INF/lib/log4j-core-2.2.jar
/usr/lib/vmware-sso/vmware-sts/webapps/openidconnect/WEB-INF/lib/log4j-core-2.2.jar
/usr/lib/vmware-cm/lib/log4j-core.jar
/opt/vmware/lib64/log4j-core-2.2.jar
List of vulnerable configuration files:
/usr/lib/vmware-vmon/java-wrapper-vmon
/etc/rc.d/init.d/vmware-psc-client
/etc/rc.d/init.d/vmware-stsd
/etc/rc.d/init.d/vmware-sts-idmd
Total found: 21
Log file: /var/log/vmsa-2021-0028_2021_12_22_06_48_40.log
===========================
2021-12-22T06:48:51 INFO main: Done.
root@photon-machine [ /tmp ]# python vc_log4j_mitigator.py
2021-12-22T06:49:07 INFO main: Script version: 1.6.0
2021-12-22T06:49:07 INFO main: vCenter type: Version: 6.5.0.14100; Build: 7801515; Deployment type: embedded; Gateway: False; VCHA: False; Windows: False;
A service stop and start is required to complete this operation. Continue?[y]y
2021-12-22T06:49:22 INFO stop: stopping services
2021-12-22T06:51:30 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware/common-jars/log4j-core-2.8.jar
2021-12-22T06:51:30 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware/common-jars/log4j-core-2.8.jar backed up to /tmp/tmpM3pWe8/usr/lib/vmware/common-jars/log4j-core-2.8.jar.bak
2021-12-22T06:51:30 INFO process_jar: VULNERABLE FILE: /usr/lib/vmware/common-jars/log4j-core-2.8.jar backed up to /tmp/tmpM3pWe8/usr/lib/vmware/common-jars/log4j-core-2.8.jar.bak
2021-12-22T06:51:33 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmp8bQh0w/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:51:33 INFO backup_file: VULNERABLE FILE: /tmp/tmp8bQh0w/WEB-INF/lib/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/tmp/tmp8bQh0w/WEB-INF/lib/log4j-core-2.2.jar.bak
2021-12-22T06:51:33 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/websso.war
2021-12-22T06:51:33 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/websso.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/websso.war.bak
2021-12-22T06:51:33 INFO process_war: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/websso.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/websso.war.bak
2021-12-22T06:51:33 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpl4pjkL/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:51:33 INFO backup_file: VULNERABLE FILE: /tmp/tmpl4pjkL/WEB-INF/lib/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/tmp/tmpl4pjkL/WEB-INF/lib/log4j-core-2.2.jar.bak
2021-12-22T06:51:33 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/afd.war
2021-12-22T06:51:33 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/afd.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/afd.war.bak
2021-12-22T06:51:33 INFO process_war: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/afd.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/afd.war.bak
2021-12-22T06:51:33 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmp3bSH2b/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:51:33 INFO backup_file: VULNERABLE FILE: /tmp/tmp3bSH2b/WEB-INF/lib/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/tmp/tmp3bSH2b/WEB-INF/lib/log4j-core-2.2.jar.bak
2021-12-22T06:51:34 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/idm.war
2021-12-22T06:51:34 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/idm.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/idm.war.bak
2021-12-22T06:51:34 INFO process_war: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/idm.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/idm.war.bak
2021-12-22T06:51:34 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpSxDSpV/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:51:34 INFO backup_file: VULNERABLE FILE: /tmp/tmpSxDSpV/WEB-INF/lib/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/tmp/tmpSxDSpV/WEB-INF/lib/log4j-core-2.2.jar.bak
2021-12-22T06:51:34 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war
2021-12-22T06:51:34 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war.bak
2021-12-22T06:51:34 INFO process_war: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war.bak
2021-12-22T06:51:34 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpYF1oVe/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:51:34 INFO backup_file: VULNERABLE FILE: /tmp/tmpYF1oVe/WEB-INF/lib/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/tmp/tmpYF1oVe/WEB-INF/lib/log4j-core-2.2.jar.bak
2021-12-22T06:51:34 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/sts.war
2021-12-22T06:51:34 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/sts.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/sts.war.bak
2021-12-22T06:51:34 INFO process_war: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/sts.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/sts.war.bak
2021-12-22T06:51:34 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpC0lqK9/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:51:34 INFO backup_file: VULNERABLE FILE: /tmp/tmpC0lqK9/WEB-INF/lib/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/tmp/tmpC0lqK9/WEB-INF/lib/log4j-core-2.2.jar.bak
2021-12-22T06:51:35 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war
2021-12-22T06:51:35 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war.bak
2021-12-22T06:51:35 INFO process_war: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war.bak
2021-12-22T06:51:35 INFO process_jar: Found a VULNERABLE FILE: /tmp/tmpuKhXpn/WEB-INF/lib/log4j-core-2.2.jar
2021-12-22T06:51:35 INFO backup_file: VULNERABLE FILE: /tmp/tmpuKhXpn/WEB-INF/lib/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/tmp/tmpuKhXpn/WEB-INF/lib/log4j-core-2.2.jar.bak
2021-12-22T06:51:35 INFO process_war: Found a VULNERABLE WAR file with: /usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war
2021-12-22T06:51:35 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war.bak
2021-12-22T06:51:35 INFO process_war: VULNERABLE FILE: /usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war backed up to /tmp/tmpM3pWe8/usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war.bak
2021-12-22T06:51:35 INFO process_jar: Found a VULNERABLE FILE: /usr/lib/vmware-cm/lib/log4j-core.jar
2021-12-22T06:51:35 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-cm/lib/log4j-core.jar backed up to /tmp/tmpM3pWe8/usr/lib/vmware-cm/lib/log4j-core.jar.bak
2021-12-22T06:51:35 INFO process_jar: VULNERABLE FILE: /usr/lib/vmware-cm/lib/log4j-core.jar backed up to /tmp/tmpM3pWe8/usr/lib/vmware-cm/lib/log4j-core.jar.bak
2021-12-22T06:51:36 INFO process_jar: Found a VULNERABLE FILE: /opt/vmware/lib64/log4j-core-2.2.jar
2021-12-22T06:51:36 INFO backup_file: VULNERABLE FILE: /opt/vmware/lib64/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/opt/vmware/lib64/log4j-core-2.2.jar.bak
2021-12-22T06:51:36 INFO process_jar: VULNERABLE FILE: /opt/vmware/lib64/log4j-core-2.2.jar backed up to /tmp/tmpM3pWe8/opt/vmware/lib64/log4j-core-2.2.jar.bak
2021-12-22T06:51:36 INFO _patch_file: Found VULNERABLE FILE: /usr/lib/vmware-vmon/java-wrapper-vmon
2021-12-22T06:51:36 INFO backup_file: VULNERABLE FILE: /usr/lib/vmware-vmon/java-wrapper-vmon backed up to /tmp/tmpM3pWe8/usr/lib/vmware-vmon/java-wrapper-vmon.bak
2021-12-22T06:51:36 INFO _patch_file: Found VULNERABLE FILE: /etc/rc.d/init.d/vmware-psc-client
2021-12-22T06:51:36 INFO backup_file: VULNERABLE FILE: /etc/rc.d/init.d/vmware-psc-client backed up to /tmp/tmpM3pWe8/etc/rc.d/init.d/vmware-psc-client.bak
2021-12-22T06:51:36 INFO _patch_file: Found VULNERABLE FILE: /etc/rc.d/init.d/vmware-stsd
2021-12-22T06:51:36 INFO backup_file: VULNERABLE FILE: /etc/rc.d/init.d/vmware-stsd backed up to /tmp/tmpM3pWe8/etc/rc.d/init.d/vmware-stsd.bak
2021-12-22T06:51:36 INFO _patch_file: Found VULNERABLE FILE: /etc/rc.d/init.d/vmware-sts-idmd
2021-12-22T06:51:36 INFO backup_file: VULNERABLE FILE: /etc/rc.d/init.d/vmware-sts-idmd backed up to /tmp/tmpM3pWe8/etc/rc.d/init.d/vmware-sts-idmd.bak
2021-12-22T06:51:36 INFO print_summary:
===== Summary =====
Backup Directory: /tmp/tmpM3pWe8
List of processed java archive files:
/usr/lib/vmware/common-jars/log4j-core-2.8.jar
/usr/lib/vmware-sso/vmware-sts/webapps/websso.war
/usr/lib/vmware-sso/vmware-sts/webapps/afd.war
/usr/lib/vmware-sso/vmware-sts/webapps/idm.war
/usr/lib/vmware-sso/vmware-sts/webapps/sso-adminserver.war
/usr/lib/vmware-sso/vmware-sts/webapps/sts.war
/usr/lib/vmware-sso/vmware-sts/webapps/openidconnect.war
/usr/lib/vmware-sso/vmware-sts/webapps/lookupservice.war
/usr/lib/vmware-cm/lib/log4j-core.jar
/opt/vmware/lib64/log4j-core-2.2.jar
List of processed configuration files:
/usr/lib/vmware-vmon/java-wrapper-vmon
/etc/rc.d/init.d/vmware-psc-client
/etc/rc.d/init.d/vmware-stsd
/etc/rc.d/init.d/vmware-sts-idmd
Total fixed: 14
NOTE: Running this script again with the --dryrun
flag should now yield 0 vulnerable files.
Log file: /var/log/vmsa-2021-0028_2021_12_22_06_49_07.log
===========================
2021-12-22T06:51:36 INFO start: starting services
2021-12-22T07:02:15 ERROR run_command: RC = 1
Stdout = Perform start operation. vmon_profile=ALL, svc_names=None, include_coreossvcs=True, include_leafossvcs=True
2021-12-22T06:51:36.811Z Running command: ['/usr/bin/systemctl', 'is-enabled', u'lwsmd']
2021-12-22T06:51:36.813Z Done running command
2021-12-22T06:51:36.815Z Service lwsmd does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:36.815Z Running command: ['/sbin/service', u'lwsmd', 'status']
2021-12-22T06:51:36.831Z Done running command
2021-12-22T06:51:36.834Z Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:36.887Z Done running command
2021-12-22T06:51:36.888Z Running command: ['/usr/bin/systemctl', 'set-property', u'lwsmd.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:36.890Z Done running command
Successfully started service lwsmd
2021-12-22T06:51:37.207Z Running command: ['/usr/bin/systemctl', 'is-enabled', u'vmafdd']
2021-12-22T06:51:37.212Z Done running command
2021-12-22T06:51:37.217Z Service vmafdd does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:37.217Z Running command: ['/sbin/service', u'vmafdd', 'status']
2021-12-22T06:51:37.233Z Done running command
2021-12-22T06:51:37.235Z Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:37.297Z Done running command
2021-12-22T06:51:37.297Z Running command: ['/usr/bin/systemctl', 'set-property', u'vmafdd.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:37.300Z Done running command
Successfully started service vmafdd
2021-12-22T06:51:37.680Z Running command: ['/usr/bin/systemctl', 'is-enabled', u'vmdird']
2021-12-22T06:51:37.684Z Done running command
2021-12-22T06:51:37.685Z Service vmdird does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:37.686Z Running command: ['/sbin/service', u'vmdird', 'status']
2021-12-22T06:51:37.702Z Done running command
2021-12-22T06:51:37.705Z Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:37.773Z Done running command
2021-12-22T06:51:37.773Z Running command: ['/usr/bin/systemctl', 'set-property', u'vmdird.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:37.776Z Done running command
Successfully started service vmdird
2021-12-22T06:51:40.067Z Running command: ['/usr/bin/systemctl', 'is-enabled', u'vmcad']
2021-12-22T06:51:40.080Z Done running command
2021-12-22T06:51:40.082Z Service vmcad does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:40.083Z Running command: ['/sbin/service', u'vmcad', 'status']
2021-12-22T06:51:40.100Z Done running command
2021-12-22T06:51:40.102Z Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:40.154Z Done running command
2021-12-22T06:51:40.154Z Running command: ['/usr/bin/systemctl', 'set-property', u'vmcad.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:40.158Z Done running command
Successfully started service vmcad
2021-12-22T06:51:41.321Z Running command: ['/usr/bin/systemctl', 'is-enabled', u'vmware-sts-idmd']
2021-12-22T06:51:41.324Z Done running command
2021-12-22T06:51:41.326Z Service vmware-sts-idmd does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:41.326Z Running command: ['/sbin/service', u'vmware-sts-idmd', 'status']
2021-12-22T06:51:41.342Z Done running command
2021-12-22T06:51:41.344Z Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:41.392Z Done running command
2021-12-22T06:51:41.392Z Running command: ['/usr/bin/systemctl', 'set-property', u'vmware-sts-idmd.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:41.395Z Done running command
Successfully started service vmware-sts-idmd
2021-12-22T06:51:42.575Z Running command: ['/usr/bin/systemctl', 'is-enabled', u'vmware-stsd']
2021-12-22T06:51:42.580Z Done running command
2021-12-22T06:51:42.584Z Service vmware-stsd does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:42.584Z Running command: ['/sbin/service', u'vmware-stsd', 'status']
2021-12-22T06:51:42.615Z Done running command
2021-12-22T06:51:42.618Z Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:42.665Z Done running command
2021-12-22T06:51:42.665Z Running command: ['/usr/bin/systemctl', 'set-property', u'vmware-stsd.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:42.669Z Done running command
Successfully started service vmware-stsd
2021-12-22T06:51:54.897Z Running command: ['/usr/bin/systemctl', 'is-enabled', u'vmdnsd']
2021-12-22T06:51:54.902Z Done running command
2021-12-22T06:51:54.904Z Service vmdnsd does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:54.904Z Running command: ['/sbin/service', u'vmdnsd', 'status']
2021-12-22T06:51:54.919Z Done running command
Successfully started service vmdnsd
2021-12-22T06:51:54.922Z Running command: ['/usr/bin/systemctl', 'is-enabled', u'vmware-psc-client']
2021-12-22T06:51:54.926Z Done running command
2021-12-22T06:51:54.928Z Service vmware-psc-client does not seem to be registered with vMon. If this is unexpected please make sure your service config is a valid json. Also check vmon logs for warnings.
2021-12-22T06:51:54.928Z Running command: ['/sbin/service', u'vmware-psc-client', 'status']
2021-12-22T06:51:54.944Z Done running command
2021-12-22T06:51:54.946Z Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:54.994Z Done running command
2021-12-22T06:51:54.995Z Running command: ['/usr/bin/systemctl', 'set-property', u'vmware-psc-client.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:54.998Z Done running command
Successfully started service vmware-psc-client
2021-12-22T06:51:57.260Z Running command: ['/usr/bin/systemctl', 'set-environment', 'VMON_PROFILE=NONE']
2021-12-22T06:51:57.263Z Done running command
2021-12-22T06:51:57.265Z Running command: ['/usr/bin/systemctl', 'daemon-reload']
2021-12-22T06:51:57.344Z Done running command
2021-12-22T06:51:57.353Z Running command: ['/usr/bin/systemctl', 'set-property', u'vmware-vmon.service', 'MemoryAccounting=true', 'CPUAccounting=true', 'BlockIOAccounting=true']
2021-12-22T06:51:57.362Z Done running command
2021-12-22T06:51:58.545Z Running command: ['/usr/bin/systemctl', 'unset-environment', 'VMON_PROFILE']
2021-12-22T06:51:58.548Z Done running command
Stderr = Service-control failed. Error Failed to start vmon services.vmon-cli RC=2, stderr=Failed to start vsphere-ui services. Error: Service crashed while starting
2021-12-22T07:02:15 ERROR start: error occurred while trying to start services
root@photon-machine [ /tmp ]# python vc_log4j_mitigator.py -r
2021-12-22T07:13:46 INFO main: Script version: 1.6.0
2021-12-22T07:13:46 INFO main: vCenter type: Version: 6.5.0.14100; Build: 7801515; Deployment type: embedded; Gateway: False; VCHA: False; Windows: False;
2021-12-22T07:13:46 INFO main: Running in dryrun mode.
2021-12-22T07:13:57 INFO print_summary:
===== Summary =====
No vulnerable files found!
Total found: 0
Log file: /var/log/vmsa-2021-0028_2021_12_22_07_13_46.log
===========================
2021-12-22T07:13:57 INFO main: Done.
root@photon-machine [ /tmp ]#
More than 1 year has passed since last update.
Register as a new user and use Qiita more conveniently
- You get articles that match your needs
- You can efficiently read back useful information
- You can use dark theme
List of users who liked
10