当前位置:网站首页>How to view Apache log4j 2 remote code execution vulnerability?
How to view Apache log4j 2 remote code execution vulnerability?
2022-07-05 21:50:00 【Blue bridge cloud class】
Apache Log4j2 Is a first-class Java Log framework , A large number of business frameworks use this component .
2021 year 11 month 24 Japan , Alibaba cloud security team to Apache The official report Apache Log4j2 Remote code execution vulnerability , This loophole Trigger condition low , Great harm .
12 month 10 Early morning ,Apache Open source project Log4j Remote Code Execution Vulnerability of Details are made public , because Apache Log4j2 Some functions have recursive parsing function , Attackers can directly construct malicious requests , Trigger Remote Code Execution Vulnerability .
CVE Number :CVE-2021-44228
Affected version :log4j2 2.0-beta9~2.14.1
As soon as this news comes out , It makes it difficult for many safety engineers to sleep , Immediately get up and enter “ Combat Defense status ”. This reminds me of the recent epidemic in Zhejiang , The medical staff rushed in overnight “ Combat status ”.
(PS: There has been a high incidence of the epidemic recently , Friends must wash their hands frequently 、 With mask 、 Don't run around !)
In addition to the safety personnel of various enterprises , Major safety manufacturers also immediately started Verification of vulnerability authenticity , And urgently notify users to upgrade rules to resist the latest vulnerabilities , Avoid serious spread of vulnerability hazards .
How serious is it ? Let me just say one , Feel for yourself :
Enterprise patching may take several hours , Even to It took several days , But hacking , But only need A few minutes Time ! Is patching faster , Or hackers attack faster , I don't need to say more ?
Apache Log4j2 Not a specific Web service , But a third-party logging framework for processing logs ( library ), whatever Java Web It is possible to use this logging framework , Use Log4j2 It's really super much , Too many to count .
I really need to count one or two , It's better to count without using Log4j2 Come faster . As one can imagine , After being attacked , How wide is the coverage .
How about Reproduce this loophole , And fix it ?
We can do a lot based on Java Developed Web service To reproduce this loophole , As long as the service uses log4j2 library ( Versions within the scope of vulnerability ) that will do , such as Apache Solr .
The method of triggering the vulnerability is very simple , Only need to Solr Administrator interface action Parameter sending Payload , Because the interface will call log4j Log , Therefore, the vulnerability execution will be triggered . The interface is as follows :
http://127.0.0.1:8983/solr/admin/cores?action=
Next use DNSlog To construct a verification Payload.
DNS Log For most students of penetration test , Should be familiar with , It is often used to test the loopholes of blind typing and blind injection .
If you don't know , It can be simply understood as : We get a temporary domain name , If the remote server tries to access the domain name , Will be in DNS Leave access records on , At this time, we can get some out of pocket information by querying the record .
Yes, of course , DNS log Just as one of the ways to verify the existence of vulnerabilities , Is not the only solution .
Blue bridge cloud class Slightly rubbed a heat picture , Launched 《 Apache Log4j 2 Detailed explanation of Remote Code Execution Vulnerability 》, use Hands-on experiment To help you reproduce Apache Log4j2 Remote code execution vulnerability .
This course will introduce this vulnerability in detail principle 、 Utilization mode 、 Excavation method and repair method , It also includes hands-on Online experimental environment , Understand the loopholes more deeply .
The key is coming. ! Immediately , Learn for free !
Apache Log4j 2 Remote code execution vulnerability
Now? , Let's talk about the loopholes Mining methods and tools .
Vulnerability mining can be carried out from White box and black box From two angles :
- If you are reviewing whether your application is affected by log4j2 Holes affect , White box testing is the way you should first choose , It can help you do the most comprehensive inspection from the source code level .
- Black box testing has great uncertainty , Because from a black box perspective , Any parameter may trigger log4j2 Loophole . Therefore, the accuracy of black box test , A large part depends on whether the parameters tested are comprehensive .
I recommend two tools , For your reference :
1、 The following tool is recommended for white box testing to scan the source code :
CVE-2021-44228-Scanner
You can download the corresponding version according to the platform :
2、 The following tool is recommended for black box testing :
BurpSuite Pro plug-in unit
open BurpSuite Pro, Switch to Extender -> BApp Store, Search in the search box on the right log4, You can see two plug-ins ( end 2021 year 12 month 22 Japan ):
- log4shell Everywhere: Passive scanning plug-in
- log4Shell Scanner: Active scanning plug-in
Install the above two plug-ins respectively , And then in Active Scan and Passive Scan It will automatically check log4j Loophole , If a loophole is found , The result will be Dashboard Show in .
Okay , Today's Apache Log4j 2 Remote code execution vulnerabilities are shared here . If you want to duplicate this vulnerability , And practice by yourself , You can poke the link below for free ~
Apache Log4j 2 Remote code execution vulnerability
边栏推荐
- Pointer parameter passing vs reference parameter passing vs value parameter passing
- 华为联机对战如何提升玩家匹配成功几率
- 怎么利用Tensorflow2进行猫狗分类识别
- Summary of data analysis steps
- Summary of El and JSTL precautions
- Poj3414 extensive search
- Codeforces 12D Ball 树形阵列模拟3排序元素
- 多家呼吸机巨头产品近期被一级召回 呼吸机市场仍在增量竞争
- poj 3237 Tree(树链拆分)
- 他们主动布局(autolayout)环境的图像编辑器
猜你喜欢
Cross end solution to improve development efficiency rapidly
Uni app Bluetooth communication
华为游戏多媒体服务调用屏蔽指定玩家语音方法,返回错误码3010
Deployment of Jenkins under win7
Huawei cloud modelarts text classification - takeout comments
Huawei game multimedia service calls the method of shielding the voice of the specified player, and the error code 3010 is returned
Comprehensive optimization of event R & D workflow | Erda version 2.2 comes as "7"
DBeaver同时执行多条insert into报错处理
張麗俊:穿透不確定性要靠四個“不變”
Defect detection - Halcon surface scratch detection
随机推荐
Detailed explanation of memset() function usage
sql常用语法记录
PIP install beatifulsoup4 installation failed
Objects in the list, sorted by a field
What should I do to prepare for the interview algorithm position during school recruitment?
Ethereum ETH的奖励机制
Summary of data analysis steps
Oracle检查点队列–实例崩溃恢复原理剖析
使用Aspect制作全局异常处理类
Opérations de lecture et d'écriture pour easyexcel
張麗俊:穿透不確定性要靠四個“不變”
Dbeaver executes multiple insert into error processing at the same time
Access Zadig self-test environment outside the cluster based on ingress controller (best practice)
Li Kou ----- the maximum profit of operating Ferris wheel
初级软件测试必问面试题
Why can't Chinese software companies produce products? Abandon the Internet after 00; Open source high-performance API gateway component of station B | weekly email exclusive to VIP members of Menon w
POJ 3237 tree (tree chain splitting)
思特奇加入openGauss开源社区,共同推动数据库产业生态发展
Teach yourself to train pytorch model to Caffe (2)
Four components of logger