当前位置:网站首页>Log4j vulnerability elk platform processing method (logstah5.5.1)
Log4j vulnerability elk platform processing method (logstah5.5.1)
2022-07-28 22:31:00 【5xp_ two thousand and one】
End of network closure , Start to deal with log4j Loophole :
Method one replaces jar file
Method 2 Delete jar The class in the package
1. Application vulnerability Replace log4j-core xxx .jar
2.es Vulnerabilities need to be replaced core and api Otherwise, the report will be wrong :NoSuchFieldError: EMPTY_BYTE_ARRAY
3.logstah5.5.1 Loophole Take the second way
zip -q -d log4j-core-2.6.2.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
Refer to official documentation :Logstash 5.0.0-6.8.20 and 7.0.0-7.16.0: Log4j CVE-2021-44228, CVE-2021-45046 remediation - Security Announcements - Discuss the Elastic Stack
边栏推荐
- 6K6w5LiA5qyh5pS75Ye75YiG5p6Q
- What are the main functions and uses of LCR tester
- Leetcode question brushing series - sum of majority type
- Att & CK Threat Intelligence
- 20-09-27项目迁移到阿里折腾记录(网卡顺序导致服务无法通过haproxy连接到db)
- 2022年一级建造师考试什么时候才能报名?
- LeetCode刷题系列之-多数之和类型
- How to realize dynamic route switching and route caching in vuejs
- The function of wechat applet to cut pictures
- SSH password free login
猜你喜欢

HCIP(8)

Lin Xiaobin, head of Tencent cloud database, borrowed 100 million yuan to speculate in stocks? Insider: the amount is not true

How to install WiFi correctly

6K6w5LiA5qyh5pS75Ye75YiG5p6Q

【CVPR 2021】Cylinder3D:用于LiDAR点云分割的圆柱体非对称3D卷积网络

The function of wechat applet to cut pictures

Ngrok intranet penetration

Solve Jupiter: the term 'Jupiter' is not recognized as the name of a cmdlet, function, script file

SQL注入 Less34(POST型宽字节注入+布尔盲注)

(翻译)图技术简明历史
随机推荐
容器化配置启动redis集群 单机6节点 3主3从
Soft exam network engineer
HCIP(15)
6K6w5LiA5qyh5pS75Ye75YiG5p6Q
Lotus 1.16.0 extend sector expiration time
tutorial/detailed_ workflow. Ipynb quantitative finance qlib Library
Sword finger offer II 063. replacement word (medium prefix tree string)
2021 mathematical modeling group B exercise
Sword finger offer II 066. sum of words (medium prefix tree design string)
[LiteratureReview]Object Detection and Mapping with Bounding Box Constraints
2021 mathematical modeling group B code
Netease Yunxin 2022q2 product supply station, come and get your product supply plan!
SQL injection less38 (Stack Injection)
Tensorflow serving high performance machine learning model service system
CMD common commands
XXX port is already in use
使用webWorker执行后台任务
imx6q gpio复用
静态路由和缺省路由实验
The blueprint of flask complements openpyxl