Submit #25543: Remote Code Execution in Java logging library Apache Log4j 2المعلومات

TitleRemote Code Execution in Java logging library Apache Log4j 2
DescriptionA flaw was found in the Java logging library Apache Log4j 2 in versions from 2.0.0 and before and including 2.14.1 which could allow a remote attacker to execute code on the server if the system logs an attacker controlled string value with the attacker's JNDI LDAP server lookup. The highest threat from the vulnerability is to data confidentiality and integrity as well as system availability. This issue only affects log4j versions between 2.0 and 2.14.1. log4j. Version 1.x is NOT affected by this flaw. In order to exploit this flaw you need * A remotely accessible endpoint with any protocol (HTTP, TCP, etc) that allows an attacker to send arbitrary data, * A log statement in the endpoint that logs the attacker controlled data. Mitigation: Set log4j2.formatMsgNoLookups to true. CVE-2021-44228 Vulnerability Analysis: https://www.randori.com/blog/cve-2021-44228/
Source⚠️ https://access.redhat.com/security/cve/cve-2021-44228
Source IdCVE-2021-44228
Usermisc (ID 3)
Submission10/12/2021 11:06 (2 years ago)
Moderation10/12/2021 11:35 (29 minutes later)
Accepted
Duplicate
VulDB EntryVDB-187925

Do you need the next level of professionalism?

Upgrade your account now!