Submit #25543: Remote Code Execution in Java logging library Apache Log4j 2信息

TitleRemote Code Execution in Java logging library Apache Log4j 2
DescriptionA flaw was found in the Java logging library Apache Log4j 2 in versions from 2.0.0 and before and including 2.14.1 which could allow a remote attacker to execute code on the server if the system logs an attacker controlled string value with the attacker's JNDI LDAP server lookup. The highest threat from the vulnerability is to data confidentiality and integrity as well as system availability. This issue only affects log4j versions between 2.0 and 2.14.1. log4j. Version 1.x is NOT affected by this flaw. In order to exploit this flaw you need * A remotely accessible endpoint with any protocol (HTTP, TCP, etc) that allows an attacker to send arbitrary data, * A log statement in the endpoint that logs the attacker controlled data. Mitigation: Set log4j2.formatMsgNoLookups to true. CVE-2021-44228 Vulnerability Analysis: https://www.randori.com/blog/cve-2021-44228/
Source⚠️ https://access.redhat.com/security/cve/cve-2021-44228
Source IdCVE-2021-44228
Usermisc (ID 3)
Submission2021-12-10 11時06分 (2 years ago)
Moderation2021-12-10 11時35分 (29 minutes later)
StatusDuplicate
VulDB Entry187925

Might our Artificial Intelligence support you?

Check our Alexa App!