Disclosed vulnerabilities allow for remote code execution in products that use the Log4j Apache library.
Security vulnerabilities CVE-2021-44228 & CVE-2021-45046 in Apache Log4j 2 library.
For customers with active maintenance, if you have not updated from an impacted version (any product release prior to December 15, 2021), or have updated to the December 15, 2021 product release, please update to one of the newer releases:
These instructions remove the jndilookup.class from vulnerable jars. There are two components that don’t work with the removal of that function and we replace those specific components jars with 2.16. Python is required to run the script. The script ensures we find all instances of the JndiLookup.class file even inside nested java libraries.
If you see the error, “This installation is forbidden by system policy,” re-run from downloads using right-click “Run as Administrator”
7. At the end of the installation select “Disable path length limit”
8. Download the required Python script and Log4j version 2.16 jars for Windows in the remove_jndi.zip attached to this article, which contains:
Recommended step: Verify that there are no remaining JndiLookup.class files earlier than version 2.16 in your product.
1. Run the remove_jndilookup with the “--dryrun” flag to instruct the script to scan the directories, but do not take action on the files:python.exe c:\remove_jndi\remove_jndilookup_win.py --dryrun "C:\Program Files\Tableau\Tableau Server" > verification.txt
python.exe c:\remove_jndi\remove_jndilookup_win.py --dryrun "c:\ProgramData\Tableau\Tableau Server" >> verification.txt
Recommended step: Verify there are no remaining JndiLookup.class files earlier than version 2.16 in your product.
You may then run the remove_jndilookup with the --dryrun flag to have the script scan the directories, but not take any action on the files:
1. Run the remove_jndilookup.py script with the --dryrun flag against the install directory to have the script scan the directory, but not take any action on the files.
sudo ./remove_jndilookup.py --dryrun /opt/tableau/tableau_server/packages > verification.txt
NOTE: Once the remove_jndilookup.py script completes, run the script a second time against the data directory to validate the data directory. By default /var/opt/tableau/tableau_server.
2. First, make a copy of the script in the home directory of the unprivileged user, which is named tableau by default
sudo cp ./remove_jndilookup.py /var/opt/tableau/tableau_server
3. Change ownership of the script to the tableau user and group
sudo chown tableau:tableau /var/opt/tableau/tableau_server/remove_jndilookup.py
5. Start a session as the unprivileged user
sudo su -l tableau
6. Run the script with the --dryrun flag against the data directory to have the script scan the directory, but not take any action on the files.
./remove_jndilookup.py –dryrun /var/opt/tableau/tableau_server > datadirverification.txt
If the "Findings:" section of the dry run output in verification.txt and datadirverification.txt contains no entries then it did not find any more jars that contained the JndiLookup.class
7. Exit the Tableau shell
exit
001534225
1850 KB
1846 KB

We use three kinds of cookies on our websites: required, functional, and advertising. You can choose whether functional and advertising cookies apply. Click on the different cookie categories to find out more about each category and to change the default settings.
Privacy Statement
Required cookies are necessary for basic website functionality. Some examples include: session cookies needed to transmit the website, authentication cookies, and security cookies.
Functional cookies enhance functions, performance, and services on the website. Some examples include: cookies used to analyze site traffic, cookies used for market research, and cookies used to display advertising that is not directed to a particular individual.
Advertising cookies track activity across websites in order to understand a viewer’s interests, and direct them specific marketing. Some examples include: cookies used for remarketing, or interest-based advertising.