Apache Log4j attention 0day update immediately

A zero-day which affects the popular Apache Log4j (CVE-2021-44228) was released on December 9, 2021 and may allow Remote Code Execution (RCE).

This is already in use and anyone using Log4j should update to version 2.15.0 as soon as possible. The final version is already on download Apache.apache log4j

If the latest version is not available, Cloudflare has a WAF tweak that can also protect you. You must use a firewall and set the system property "log4j2.formatMsgNoLookups" to "true". or by removing the JndiLookup class from the class path.

Those who use Cloudflare WAF can also take advantage of three new rules that have been developed to mitigate any exploitation efforts:

 

RuleID Description Default Action
100514 (legacy WAF)
6b1cc72dff9746469d4695a474430f12 (new WAF)
Log4j Headers BLOCK
100515 (legacy WAF)
0c054d4e4dd5455c9ff8f01efe5abb10 (new WAF)
Log4j Body BLOCK
100516 (legacy WAF)
5f6744fa026a4638bda5b3d7d5e015dd (new WAF)
Log4j URL BLOCK

 

The firewall rules are three and they inspect HTTP headers, body and the URL respectively.

More details about the vulnerability can be found in the official Log4j security page.

Who is affected

Log4j is a powerful Java-based log library developed by the Apache Software Foundation.

iGuRu.gr The Best Technology Site in Greecefgns

Subscribe to Blog by Email

Subscribe to this blog and receive notifications of new posts by email.

Apache Log4j, 0day, iguru

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).