RCE 0-day exploit found in log4j2
December 10, 2021
Under Attack? Contact Us
There has been a new 0-day exploit discovered by Chen Zhaojun of the Alibaba Cloud Security Team. This exploit, CVE-2021-44228, is particularly alarming as it is within Apache Log4j2, a very popular logging platform used for Java.
There is functionality within Log4j2 that supports replacement of log entries through JNDI and LDAP. The log entries are templatized using variables that are replaced through lookups done in real time. This functionality does not have any protections in place to validate the data being entered.
Due to this, an attacker with access to an LDAP source that Log4j2 is connecting to can inject malicious code that has the potential for service interruption, data exfiltration, or even system takeover.
Anyone running Apache Log4j2 version 2.14.1 or below. If you are running a Java application, it is worthwhile to review the package, either manually or through a package manager such as Maven, being used to verify if Log4j2 is being used, and if so, what version.
You may think you are not using Log4j2, but considering how ubiquitous it has become, it is worth the time to verify.
The most effective solution is to upgrade to Log4j2 version 2.15.0 or above, but that can be a heavy lift and can take teams quite some time to complete. There are a couple of immediate steps that can be implemented more easily as shown below.
We recommend implementing one of these as soon as possible until upgrades are completed.
Review any and all logs that are created by your Java applications. Grep your logs for system commands such as ‘ps’, ‘bash’, ‘nc’, and ‘os’ that are used to probe that an exploit has functioned and is getting data back.
This is where the importance of log centralization and monitoring really comes into play. Without the ability to quickly and easily search across your logs, it is very difficult to be able to investigate scenarios such as this.
There are zero day exploits found fairly regularly, but to have one found in extremely popular, user controlled and managed software libraries is particularly frightening.
Please take the time to review your applications, ensure you are not affected by reviewing your log entries for anything unexpected, and patch your systems.
Copyright © 2023 CDG. All Rights Reserved