Log4j Vulnerability - What do you need to know?



Show first post

32 comments

Userlevel 7
Badge +13

https://github.com/Neo23x0/log4shell-detector

This user Florian Roth has released in the past few hours a detector that allows to detect exploitation attempts of the Log4Shell vulnerability (CVE-2021-44228). The detector has been built in such a way as to detect even attempts in which obfuscation techniques have been used. The tool can be used on any Linux host with Python installed and recursively checks the logs in /var/log.

Just sharing!

Userlevel 7
Badge +8

it’s making lots of noises since friday for us, a poc was published on github in April (chinese language)

https://github.com/nice0e3/log4j_POC

French Cybersecurity Agency are observing attacks in  honeypot infrastructure from Tor too.

Anyway for the veeam part, the answer from Gostev is comfortable:

Veeam R&D Forums Digest - THE WORD FROM GOSTEV

If you're using any software running on Apache and Java, be aware of this critical zero-day vulnerability. Log4j is a ubiquitous logging tool included in almost every Java application, meaning this vulnerability affects literally millions of servers. You can use software dependencies scanner like Syft to determine whether any of your Java apps use an affected version of Log4j. As for Veeam products, while I still need to get the official confirmation from our security team, it's unlikely we're affected because as far as I know we don't use Java in principle. Plus, as it comes to web servers, we're married to Microsoft IIS for our Windows-based apps (VBR/ONE/VSPC) and to nginx for Linux-based (Veeam Backup for AWS/Azure/GCP). The only place I'm aware that uses some Apache components is our SureBackup helper appliance, but that one certainly should not have any traces of Java.

Userlevel 7
Badge +13

This vulnerability is a lot of headache as for what’s appened with Exchange vulnerability.

Userlevel 7
Badge +17

Wow, this is a huge vulnerability… 😱😱😱

Userlevel 7
Badge +20

Saw this wow major issue. I see VMware has posted workarounds now.

Userlevel 7
Badge +14

Thanks for posting this in the community @MicoolPaul, and thanks for the shout-out. I don't have much to add 😁

This vulnerability is pretty huge. Like you already said, this does not only affect VMware. Every software project could use Log4j internally and so be vulnerable to this. So better double check every deployed project, especially if they're internet/edge facing. Scans and attacks are already happening.

 

Userlevel 7
Badge +7

VMSA-2021-0028: Questions & Answers from VMware. vCenter is one of impacted products, but now VMware does not provide the resolutions and workarounds for vCenter.

https://core.vmware.com/vmsa-2021-0028-questions-answers-faq

Comment