what is log4j vulnerability
On December 9th, 2021, the world was made aware of a new vulnerability
identified as CVE-2021-44228, affecting the Java logging package log4j.
This vulnerability earned a severity score of 10.0 (the most critical
designation) and offers remote code trivial remote code execution on
hosts engaging with software that utilizes this log4j version. This attack has been dubbed "Log4Shell".
What is the Log4j Vulnerability:
The Log4j exploit allows threat actors to take over compromised web-facing servers by feeding them a malicious text string. It exists within Log4j, an open-source Apache library for logging errors and events in Java-based applications. Third-party logging solutions like Log4j are a common way for software developers to log data within an application without building a custom solution.
In the case of Minecraft, where the Log4 Shell exploit first surfaced last week, this malicious string is entered through the chatbox. In other examples, text entered into the username box on web applications, like Apple iCloud, can also start the compromise.
The Log4J vulnerability is triggered by attackers inserting a JNDI lookup in a header field (likely to be logged) linking to a malicious server. After Log4j logs this string, the server is queried and gives directory information leading to the download and execution of a malicious java data class. This means cybercriminals can both extract private keys and, depending on the level of defenses in place, download and run malware directly on impacted servers.
According to a statement from the director of the US Cybersecurity and Infrastructure Security Agency, Jen Easterly, "This vulnerability, which is being widely exploited by a growing set of threat actors, presents an urgent challenge to network defenders given its broad use." Easterly's agency has described Log4j as "critical," a statement echoed by equivalent agencies globally, such as Germany's national cybersecurity agency (BSI). Enterprise software developer Redhat has graded Log4j with a 9.8 CVSS score, while the NIST has given it a 10 - the highest possible.
For a growing community-supported list of software and services vulnerable to CVE-2021-44228, check out this GitHub repository:
What Organizations Need to Do Right Now to Stop Log4jShell
That's
all about log4j
hope you are enjoying our content and also get understand about pegasus spyware.
guys Please don't forget to follow us on Instagram and GitHub and do like our content on Instagram.
https://instagram.com/__pytools__
Comments
Post a Comment