当前位置:网站首页>Urgent! Tencent cloud container security supports the detection of Apache log4j2 vulnerabilities for the first time. It is in free trial
Urgent! Tencent cloud container security supports the detection of Apache log4j2 vulnerabilities for the first time. It is in free trial
2022-06-23 22:50:00 【Tencent virtual machine security】
Tencent cloud container security service team found tens of thousands of images affected by ApacheLog4j2 Remote Code Execution Vulnerability affects , There is a high risk ! In order to help customers across the network quickly repair vulnerabilities , Free trial for users , Log in to the console (https://console.cloud.tencent.com/tcss) You can experience it quickly .
Vulnerability description
Tencent cloud container security service team noticed ,12 month 9 Friday night ,Apache Log4j2 Details of the deserialization Remote Code Execution Vulnerability have been disclosed ,Apache Log4j-2 in JNDI Inject holes , When the program logs the data entered by the user , This vulnerability can be triggered , Successful exploitation of this vulnerability can execute arbitrary code on the target server .
Apache Log4j2 It's based on Java The logging tool for . The tool rewrites Log4j frame , And introduced a lot of rich features . The log framework is widely used in business system development , Used to record log information . Most of the time , Developers may write the error information caused by user input to the log . Because this component is widely used , The use threshold is very low , Great harm , Tencent security experts recommend that all users upgrade to a secure version as soon as possible .
Vulnerability risk
High-risk , The vulnerability affects a wide range , The use threshold is very low , Great harm .
CVSS score :10( highest )
Vulnerability details | Loophole PoC | Loophole EXP | Use in the field |
|---|---|---|---|
It has been made public | It is known that | It is known that | It has been found that |
Vulnerability version impact
Apache log4j2 2.0 - 2.14.1 Versions are affected .
Security version
Apache log4j-2.15.0-rc2 (2.15.0-rc1 edition , Verified by Tencent security experts, it can be bypassed )
Suggestions for bug fixing
Tencent cloud container security team recommends that users use Tencent container security services (TCSS) Perform a security scan on the used image , Detect and fix mirror vulnerabilities , The detailed operation steps are as follows :
(1) Log in to Tencent container security service console (https://console.cloud.tencent.com/tcss), receive 7 Day free trial ;
(2) Open the left side in turn “ Image security ”, Check the local image and warehouse image ;
(3) Local mirror / Warehouse mirroring function - Click one button to detect , Batch selection ApacheLog4j Component associated image , Confirm one click Scan ;
(4) Scan complete , Click Details to confirm that the asset exists Apache Log4j Component remote code execution vulnerability risk ;
(5) Upgrade to Apache Log4j To the safe version ;
(6) Go back to the container security service console and open it again “ Image security ”, Retest to ensure that assets are not subject to Apache Log4j Component Remote Code Execution Vulnerability affects ;
(7) After confirming the repair , Restart the container based on the new image .
tencent T-Sec Host security ( Cloud mirror )、 Tencent security T-Sec Web Application firewall (WAF)、 tencent T-Sec Advanced threat detection system (NDR、 Royal boundary )、 tencent T-Sec Cloud firewall products have supported detection, interception and utilization Apache Log4j2 Attack activities of Remote Code Execution Vulnerability .
Official patch
upgrade ApacheLog4j All relevant applications to the latest Log4j-2.15.0-rc2 edition . (2.15.0-rc1 edition , Verified by Tencent security experts, it can be bypassed )
Patch address
https://github.com/apache/logging-log4j2/releases/tag/log4j-2.15.0-rc2
Mitigation measures
Scheme 1 : modify Java Virtual machine startup parameters , add to -Dlog4j2.formatMsgNoLookups=true
Option two : Configure... In the code System.setProperty("log4j2.formatMsgNoLookups","true"), REPACK jar package
About Tencent's security engine capability
Tencent cloud container security service integrates Tencent security team's self-developed rhino engine capability , The rhinoceros engine is based on the public vulnerability database and the vulnerability information database accumulated by Tencent security for many years , It can accurately identify the vulnerabilities of system components and application components , Dynamically assess vulnerability risk , Accurately locate the vulnerabilities that need to be fixed first .
(1) Support Redhat、centos、ubuntu、debian、alpine And other mainstream operating systems , Support java、python、golang、nodejs、php、ruby And other mainstream programming languages .
(2) Dynamic vulnerability risk assessment is based on the general vulnerability scoring system (CVSS), According to the real propagation status of vulnerability exploitation 、 How easy it is to fix the vulnerability 、 The actual harm that a vulnerability can cause 、 Safety expert evaluation, etc , Dynamically assess the actual risk of vulnerabilities .
(3) There are many version types in system components and application components 、 Open loopholes, inaccurate information and other issues , The engine combines the research and judgment of automation operation and security experts , Provide multidimensional accurate vulnerability identification .
About Tencent container security service (TCSS)
Tencent container security service (Tencent Container Security Service, TCSS) Provide container asset management 、 Image security 、 Security services such as runtime intrusion detection , Ensure that the container is generated from the image 、 The full lifecycle of storage to runtime , Help enterprises build container safety protection system .
The Tencent container security service product team polished the product in combination with the safety management and operation experience of the largest container cluster in the industry , Promote the preparation and formulation of industry standards and specifications , And start 《 Container safety white paper 》, The present situation of domestic container environmental safety is analyzed and summarized , Help the standardization and healthy development of cloud native security ecology .
边栏推荐
- Performance test - LoadRunner obtains the return value and user-defined parameters (parameter operation)
- Grpc: quickly configure the general API to obtain process meta information
- SAP mm ml81n creates a service receipt for a purchase order and reports an error - no matching Po items selected-
- Method of thread synchronization in kotlin
- Flutter Utils
- C language picture transcoding for performance testing
- Batch production of plant hangtag
- MySQL数据库配置信息查看与修改方法详解
- Website construction is not set to inherit the superior column. How to find a website construction company
- 解密抖音春节红包背后的技术设计与实践
猜你喜欢

Ant won the finqa competition champion and made a breakthrough in AI technology of long text numerical reasoning

为什么你的数据图谱分析图上只显示一个值?

应用实践 | Apache Doris 整合 Iceberg + Flink CDC 构建实时湖仓一体的联邦查询分析架构
![[technical dry goods] the technical construction route and characteristics of zero trust in ant Office](/img/d1/ce999b9f72bbb8f692c4298b4042aa.png)
[technical dry goods] the technical construction route and characteristics of zero trust in ant Office

蚂蚁获FinQA竞赛冠军,在长文本数值推理AI技术上取得突破

脚本之美│VBS 入门交互实战

SLSA: 成功SBOM的促进剂

Game security - call analysis - write code

解密抖音春节红包背后的技术设计与实践
Mysql中的触发器定义及语法介绍
随机推荐
蚂蚁获FinQA竞赛冠军,在长文本数值推理AI技术上取得突破
What should I do if the RDP fortress server connection times out? Why should enterprises use fortress machines?
Heat transfer oil electric heater
為什麼你的數據圖譜分析圖上只顯示一個值?
Analysis and application of ThreadLocal source code
How to use FTP to upload websites to the web
SLSA: 成功SBOM的促进剂
What are the operation and maintenance advantages of Fortress machine web application publishing server? Two outstanding advantages
What are the application flow restrictions of API gateway framework?
Start learning simple JS
First talk about the necessary skills of Architecture
API gateway monitoring function the importance of API gateway
Command line setting the next boot to enter safe mode
Get and post are nothing more than TCP links in nature?
Game security - call analysis - write code
Overall solution for digital transformation of medical supply chain management
Micro build low code tutorial -hello, world
What is the API gateway architecture? What are the common gateway types?
Server classification of hardware knowledge (2)
The article "essence" introduces you to VMware vSphere network, vswitch and port group!