The Internet is ablaze with talk about the Log4j vulnerability. Here are a few details that have been understood about the vulnerability so far:
- Apache Log4j is a logging utility
- A vulnerability in the Log4j logging library was first reported on Thursday the 9th of October, 2021
- It has been named as CVE-2021-44228
- All Log4j versions previous to v2.15.0 are affected by this vulnerability
- It is a zero day exploit first detected by Chen Zhaojun of Alibaba Cloud Security Team
- Log4j is most popular logging library with over 400,000 downloads from its GitHub site
- All large applications make use of logging software to keep track of errors and logs
- Instead of creating their own logging software, many companies rely on the open source logging software by companies such as the Apache Foundation
- Log4j library is embedded in Twitter, Microsoft, Amazon, Minecraft, Steam, Apple iCloud and many, many more applications
- This vulnerability causes remote code execution when a certain string is passed
- The attacker can load malicious code onto the server and take control of the server
- Apache has given this vulnerability a severity of “Critical” and a base CVSS score of 10
- The Apache foundation has since then released a patch
- These are the mitigation measures as released by the Apache foundation:
a. In releases >=2.10, this behavior can be mitigated by setting either the system property log4j2.formatMsgNoLookups
or the environment variable LOG4J_FORMAT_MSG_NO_LOOKUPS
to true
.
b. For releases >=2.7 and <=2.14.1, all PatternLayout
patterns can be modified to specify the message converter as %m{nolookups}
instead of just %m
c. For releases >=2.0-beta9 and <=2.10.0, the mitigation is to remove the JndiLookup
class from the classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
d. If possible do upgrade to version Log4j v2.15.0
15. You can identify a vulnerable remote server by using open source web application ‘CanaryTokens.org'(please check all permissions)
What has been your experience with the Log4Shell exploit?