Log4j Vulnerability - What do you need to know?



Show first post

32 comments

Userlevel 7
Badge +8

it’s making lots of noises since friday for us, a poc was published on github in April (chinese language)

https://github.com/nice0e3/log4j_POC

French Cybersecurity Agency are observing attacks in  honeypot infrastructure from Tor too.

Anyway for the veeam part, the answer from Gostev is comfortable:

Veeam R&D Forums Digest - THE WORD FROM GOSTEV

If you're using any software running on Apache and Java, be aware of this critical zero-day vulnerability. Log4j is a ubiquitous logging tool included in almost every Java application, meaning this vulnerability affects literally millions of servers. You can use software dependencies scanner like Syft to determine whether any of your Java apps use an affected version of Log4j. As for Veeam products, while I still need to get the official confirmation from our security team, it's unlikely we're affected because as far as I know we don't use Java in principle. Plus, as it comes to web servers, we're married to Microsoft IIS for our Windows-based apps (VBR/ONE/VSPC) and to nginx for Linux-based (Veeam Backup for AWS/Azure/GCP). The only place I'm aware that uses some Apache components is our SureBackup helper appliance, but that one certainly should not have any traces of Java.

Userlevel 7
Badge +13

WOW, this issue will have unimaginable effects! For example Apache and Java can suffer from this issue! So many parts of the internet will be affected! 

Userlevel 3

Red Hat products not affected:
https://access.redhat.com/security/vulnerabilities/RHSB-2021-009

Userlevel 7
Badge +20

Unfortunately, there’s a new second CVE that’s need a new patch.

https://nvd.nist.gov/vuln/detail/CVE-2021-45046

Yes, log4j 2.16.0 is needed now. And who knows if this is the last issue :sunglasses:

Unfortunately this is getting worse. At first there was concern this would result in Denial of Service attacks, now the CVE severity is expected to be increased from 3.7 to around 9 as limited Remote Code Execution (RCE) has been discovered.

Userlevel 7
Badge +17

hi use this script for scan my Winzoz server :D

ScriptsAndAutomationPolicies/get-log4jrcevulnerability.ps1 at master · N-able/ScriptsAndAutomationPolicies · GitHub

 

Anyone can share a good scripts for Nix enviroment?

Thx

Very nice script :thumbsup_tone2:

Userlevel 3

:warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning:

Nearly full list of whats vendor/products are affected:

https://github.com/NCSC-NL/log4shell/tree/main/software

 :warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning::warning:

grazie Signore

Userlevel 7
Badge +13

If interested: Here is a list of all HPE products NOT affected:

https://support.hpe.com/hpesc/public/docDisplay?docId=emr_na-a00120086en_us

Here is a list of all affected HPE products and versions:

https://support.hpe.com/hpesc/public/docDisplay?nlaid=HPGL_ALERTS_3009925&docId=emr_na-hpesbgn04215en_us

Comment