当前位置:网站首页>Serious hazard warning! Log4j execution vulnerability is exposed!
Serious hazard warning! Log4j execution vulnerability is exposed!
2022-06-26 05:12:00 【Another cloud shot】
12 month 10 Early morning ,Apache Open source project Log4j2 Details of the remote code execution vulnerability are disclosed , The vulnerability threat level is : serious .
Log4j2 It's based on Java The logging tool for . It rewrites Log4j frame , Introduced a number of rich features , Allows users to control the destination of log information delivery to the console 、 file 、GUI Components etc. . At the same time, by defining the level of each log information , It enables users to control the log generation process more carefully .
Log4j It is the most widely used in the world java One of the logging frameworks . The vulnerability also affects many of the world's most widely used open source components , Such as Apache Struts2、Apache Solr、Apache Druid、Apache Flink etc. . Because the vulnerability is exploited in a simple way , Once an attacker exploits the vulnerability , You can execute arbitrary code on the target server , Cause great harm to the attacker .

Vulnerability details
This vulnerability is mainly Log4j2 The contents of lookup Function exists JNDI Inject holes , This function can help developers read the configuration in the corresponding environment through some protocols . The vulnerability trigger method is very simple , As long as the content of the log contains keywords ${, Then the contents contained in this can be replaced as variables , The attacker does not need any privileges , Can execute any command .

The version affected by this vulnerability is :Apache Log4j 2.x <= 2.14.1
At the same time, if you use the following applications , Will also be affected by this vulnerability :
Spring-Boot-strater-log4j2
Apache Struts2
Apache Solr
Apache Flink
Apache Druid
ElasticSearch
flume
dubbo
logstash
kafka
Bug repair
At present, the manufacturer has released a new version log4j-2.15.0-rc2, This version has fixed the vulnerability . I hope you can upgrade to the new version as soon as possible .
The official link :https://github.com/apache/logging-log4j2/releases/tag/log4j-2.15.0-rc2
If it is not convenient for you to upgrade the version for the time being , You can also carry out emergency treatment through the following methods , And complete the version upgrade as soon as it is convenient :
modify jvm Parameters -Dlog4j2.formatMsgNoLookups=true
Modify the configuration log4j2.formatMsgNoLookups=True
Set the system environment variable FORMAT_MESSAGES_PATTERN_DISABLE_LOOKUPS Set to true
Whether it was the year before last Apach Shiro Of cookie Persistence parameters rememberMe There are loopholes in the encryption algorithm , Or last year 5 Of the month Fastjson Remote Code Execution Vulnerability notification . It seems that there are always various problems in network security , But finding and fixing the vulnerability itself is an upgrade to security . The safe way to stop will soon be broken , Only continuous updating and upgrading is the real network security .
Recommended reading
边栏推荐
- Tensorflow and deep learning day 3
- Second day of deep learning and tensorfow
- SSH connected to win10 and reported an error: permission denied (publickey, keyboard interactive)
- Zuul implements dynamic routing
- ModuleNotFoundError: No module named ‘numpy‘
- The beautiful scenery is natural, and the wonderful pen is obtained by chance -- how is the "wonderful pen" refined?
- LeetCode 19. 删除链表的倒数第 N 个结点
- Keras actual combat cifar10 in tensorflow
- UWB ultra high precision positioning system architecture
- Day4 branch and loop jobs
猜你喜欢

Final review of brain and cognitive science

Codeforces Round #800 (Div. 2)

UWB超高精度定位系统原理图
Briefly describe the pitfalls of mobile IM development: architecture design, communication protocol and client

cartographer_backend_constraint

【上采样方式-OpenCV插值】

PHP二维/多维数组按照指定的键值来进行升序和降序

-Discrete Mathematics - Analysis of final exercises

一个从坟墓里爬出的公司

zencart新建的URL怎么重写伪静态
随机推荐
Why does the mobile IM based on TCP still need to keep the heartbeat alive?
LeetCode 19. 删除链表的倒数第 N 个结点
A beginner's entry is enough: develop mobile IM from zero
Experience of reading the road to wealth and freedom
Implementation of IM message delivery guarantee mechanism (II): ensure reliable delivery of offline messages
How to rewrite a pseudo static URL created by zenpart
广和通联合安提国际为基于英伟达 Jetson Xavier NX的AI边缘计算平台带来5G R16强大性能
Difference between return and yield
Dbeaver installation and configuration of offline driver
skimage.morphology.medial_axis
C# 40. byte[]与16进制string互转
Sentimentin tensorflow_ analysis_ cell
《财富自由之路》读书之一点体会
两步处理字符串正则匹配得到JSON列表
6.1 - 6.2 公钥密码学简介
6.1 - 6.2 Introduction à la cryptographie à clé publique
Decipher the AI black technology behind sports: figure skating action recognition, multi-mode video classification and wonderful clip editing
Image translation /gan:unsupervised image-to-image translation with self attention networks
86. (cesium chapter) cesium overlay surface receiving shadow effect (gltf model)
app 应用安装到手机,不显示图标,引发的思考