Thursday, March 30, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Two new vulnerabilities are found on Log4j, only one of them is fixed yet

Two new vulnerabilities are found on Log4j, only one of them is fixed yet

Apache has released Log4Shell version 2.17.0 to fix one of the flaws but there are more flaws to be fixed.


Rusen Gobel Rusen Gobel
December 20, 2021
3 min read
Two new vulnerabilities are found on Log4j, only one of them is fixed yet

The security flaws on the Apache Log4Shell module look like they will not end anytime soon. The company has recently released a patch dubbed 2.15.0, which was incomplete to fix the problems. Then the 2.16.0 version was released, and it was thought to be safe because it was just cutting the flawed services of Log4j. Now, whole new flaws emerge.

The flaw which is fixed by Log4j 2.17.0

The denial-of-service vulnerability, which is tracked as CVE-2021-45046, was fixed by the 2.16.0 version of the Log4Shell, by disabling JNDI lookups. However, a new way to break the system emerged. This new flaw is tracked as CVE-2021-45105 and has a CVSS score of 7.5. The flaw enables attackers to use a string to crash the application.

The user has shared the details as “If a string substitution is attempted for any reason on the following string, it will trigger an infinite recursion, and the application will crash”. The string can be seen below:

${${::-${::-$${::-j}}}}

The CVE-2021-45105 vulnerability is fixed by the Log4Shell 2.17.0 update.

The flaw which is not fixed by Log4j 2.17.0

The new flaw tracked as CVE-2021-4104, which only appears in Log4j 1.x versions, expands Log4j’s attack surface. With this new vulnerability, attackers can exploit the servers locally via JavaScript WebSocket connection by using other exposed Log4j devices. Security researchers stated that there is no proof of active exploitation. They also warned about the significant expansion of the attack surface caused by this.

The flaw only works in the applications using JMSAppender, which is not active by default. This flaw is not patched by Apache yet. However, updating all local development and internet-connected environments to Log4j 2.16.0 or 2.17.0 is said to be removing the risk of exploitation for this flaw.

Bitdefender has shared percentages of the countries in both the “attacker” and “target” sides.

Over 35,000 Java packages are affected by the flaw

Google Open Source Insights Team also shared the details of their research about this period. In the results of their research, 8% of the Maven Central repository, which roughly equals 35,000, have been found using flawed Log4j versions, adding that only around 7,000 of them have a direct dependency on it.

Related Stories

  • CISA published an emergency directive for Log4j
  • Google joining the war against Log4j exploits
  • Hackers exploit Log4j to inject Monero miners, shifting from LDAP to RMI
  • A third, new Apache Log4j vulnerability is discovered
  • How to scan your server to detect Log4j (Log4Shell) vulnerability
  • The Log4j flaw is patched but it is still vulnerable
  • CISA published Log4j vulnerability guidance
  • Zero-day Apache Log4j RCE vulnerability (Log4Shell) is being exploited

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: Apache HTTP Server
Rusen Gobel

Rusen Gobel

Rusen Gobel is the managing editor of Cloud7. With more than 10 years of experience, Rusen worked as a hardware and software news editor for technology sites such as ShiftDelete, Teknokulis, Hardware Plus, BT Haber. In addition, Rusen publishes consumer product reviews on his YouTube channel. While consumer electronics has been his main focus for years, now Rusen is more interested in WordPress and software development. He had contributed different web application projects in his professional career. Rusen had graduated from Istanbul University, department of Computer Engineering. Rusen has a very high passion for learning and writing for every kind of technology. That's why he has been working as a tech editor for more than ten years on several different technology magazines and online news portals.

Comments 2

  1. correct says:
    1 year ago

    CVE-2021-4104 is log4j v1…

    Reply
    • Atalay Kelestemur says:
      1 year ago

      Thank you for the comment. Yes, that is what we are saying. It is a new flaw for log4j v1.

      Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Southern Cross NEXT Submarine Cable completes its Pan-Pacific voyage

Southern Cross NEXT Submarine Cable completes its Pan-Pacific voyage

Related News

7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • Trisquel GNU/Linux 11.0 review
  • What is continuous testing in DevOps?
  • [Event] FOSSASIA Summit 2023 – Get your discounted ticket now
  • What is browser automation: Getting started guide
  • 7 best live chat plugins for WordPress

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.