Submit #25543: Remote Code Execution in Java logging library Apache Log4j 2
Title | Remote Code Execution in Java logging library Apache Log4j 2 |
---|---|
Description | A flaw was found in the Java logging library Apache Log4j 2 in versions from 2.0.0 and before and including 2.14.1 which could allow a remote attacker to execute code on the server if the system logs an attacker controlled string value with the attacker's JNDI LDAP server lookup. The highest threat from the vulnerability is to data confidentiality and integrity as well as system availability. This issue only affects log4j versions between 2.0 and 2.14.1. log4j. Version 1.x is NOT affected by this flaw. In order to exploit this flaw you need * A remotely accessible endpoint with any protocol (HTTP, TCP, etc) that allows an attacker to send arbitrary data, * A log statement in the endpoint that logs the attacker controlled data. Mitigation: Set log4j2.formatMsgNoLookups to true. CVE-2021-44228 Vulnerability Analysis: https://www.randori.com/blog/cve-2021-44228/ |
Source | ⚠️ https:/ |
Source Id | CVE-2021-44228 |
User | misc (ID 3) |
Submission | 10/12/2021 11:06 (2 years ago) |
Moderation | 10/12/2021 11:35 (29 minutes later) |
Accepted | Duplicate |
VulDB Entry | VDB-187925 |