当前位置:网站首页>log4j漏洞 elk平台 处理方法 (logstah5.5.1)
log4j漏洞 elk平台 处理方法 (logstah5.5.1)
2022-07-28 20:46:00 【5xp_2001】
封网结束,开始处理log4j漏洞:
方法一替换jar文件
方法二 删除jar包中的类
1.应用漏洞 替换log4j-core xxx .jar
2.es漏洞需要替换core和api 否则报错:NoSuchFieldError: EMPTY_BYTE_ARRAY
3.logstah5.5.1漏洞 采用第二种方法
zip -q -d log4j-core-2.6.2.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
边栏推荐
- 使用webWorker执行后台任务
- TensorFlow Serving 高性能的机器学习模型服务系统
- 表单验证和级联下拉列表(多种实现)
- 网易云信 2022Q2 产品补给站,快来获取你的产品补给计划吧!
- 科大讯飞笔试
- vuejs中如何实现动态路由切换及路由的缓存
- [LiteratureReview]Object Detection and Mapping with Bounding Box Constraints
- HYDAC overflow valve db08a-01-c-n-500v
- [Ruiji takeout] day05 package management business development
- CDN工作原理
猜你喜欢

IFLYTEK written examination

SQL注入 Less38(堆叠注入)

阿里云CDN实践

静态路由和缺省路由实验
![[CS231N]Lecture_2:Image Classification pipelin](/img/4f/de56b071560ada746c587a9dbc5f02.jpg)
[CS231N]Lecture_2:Image Classification pipelin

hcip实验(14)

SQL injection less34 (post wide byte injection + Boolean blind injection)

Chapter 7: drawing rotating cubes

Less than a year after its establishment! MIT derivative quantum computing company completed financing of US $9million

Sword finger offer II 054. Sum of all values greater than or equal to nodes (medium binary search tree DFS)
随机推荐
什么是时间复杂度
Typeof principle
局域网添加DNS服务器进行域名解析
Sword finger offer II 053. Medium order successor in binary search tree (medium binary search tree DFS)
Excel-VBA 快速上手(十三、日期的常见用法)
[CS231N]Lecture_ 2:Image Classification pipelin
HCIP(11)
40. Combined sum II
Summary of the use of hash table set and map when leetcode brushes questions
Part 8: creating camera classes
CDN工作原理
Future trend of defi in bear market
SQL注入 Less34(POST型宽字节注入+布尔盲注)
Sword finger offer II 064. magic Dictionary (medium dictionary tree string design)
Alibaba cloud CDN practice
Ecmasript 5/6 notes
HCIP第七次实验
LCR测试仪最为主要的功能和用途都是什么
hcip实验(15)
Establishment of Ruiji takeout development environment