当前位置:网站首页>Log4j epic loopholes, big companies like jd.com have been recruited
Log4j epic loopholes, big companies like jd.com have been recruited
2022-07-27 18:40:00 【Java sharing Officer】
Last night there was a Apache Log4j2 High risk vulnerabilities have been exposed , This remote code execution vulnerability is an epic vulnerability .
Apache Log4j2 How many companies are using this component , I don't need to say more about this , There are too many . I don't know how many programmers got up in the middle of the night last night to change their code ?

The official expression of the vulnerability principle is :Apache Log4j2 in JNDI Inject holes , When the program logs the data entered by the user , This vulnerability can be triggered , Successful exploitation of this vulnerability can execute arbitrary code on the target server .
To put it simply, it means : When printing logs , If your blog contains keywords ${ , The attacker can replace the content contained in the keyword as a variable with any attack command , And perform .

Vulnerability detection scheme
1、 Monitor whether there is relevant information through flow monitoring equipment DNSLog Domain name request
2、 By monitoring whether there is... In the relevant logs “jndi:ldap://”、“jndi:rmi” Wait for characters to find possible attacks .
Bug fixes
Apache The official has released a test patch , The successful users should upgrade the latest security version ,
Patch download :https://github.com/apache/logging-log4j2/releases/tag/log4j-2.15.0-rc1

Encounter such a wide range of vulnerabilities , For white hat, it's Chinese New Year . Batch brush vulnerability 、 Batch submission vulnerability , Party a SRC The bosses hurry to hand in the rice , This wave is enough to eat for half a year ~~
It's already coming out of the circle , The next hole to feed safety engineers is log4j !

But just when everyone was ready to submit vulnerabilities , Suddenly found this loophole, people won't accept it !


Wanting is also , This loophole has been made public , Isn't it a waste of your budget to let everyone submit it like this .



source :
https://mp.weixin.qq.com/s/k2LeP612Hdmvyi6LS1qX-g
边栏推荐
猜你喜欢

Build a simple knowledge question and answer system

2021.8.1笔记 数据库设计

2021.7.18笔记 mysql数据类型

Run the uniapp to the mobile phone (real machine debugging)

知识图谱 — pyhanlp实现命名体识别(附命名体识别代码)

2 万字 + 30 张图 | 细聊 MySQL undo log、redo log、binlog 有什么用?

Wechat applet obtains openid, sessionkey, unionid

Deep learning: stgcn learning notes
![[MIT 6.S081] Lec 3: OS organization and system calls 笔记](/img/34/073d00245eb39844bbe1740f65fe07.png)
[MIT 6.S081] Lec 3: OS organization and system calls 笔记

2021.7.17笔记 mysql其他命令
随机推荐
[MIT 6.S081] Lab 3: page tables
2021.7.28 notes
2021.7.13 note sub query
Solve the problem of JSP cascading
Deep learning: GCN case
[MIT 6.S081] Lab 5: xv6 lazy page allocation
Wechat applet wxacode.getunlimited generates applet code
Wechat applet wechat payment overview
MySQL four locks
Complete set of machine learning classification task effect evaluation indicators (including ROC and AUC)
2021.7.17笔记 mysql其他命令
Meituan Er Mian: why does redis have sentinels?
MySQL code database creation parking management system foreign key
2021.8.1笔记 DBA
[mit 6.s081] LEC 5: calling conventions and stack frames risc-v notes
Log4j 史诗级漏洞,京东这样的大厂都中招了
2021.8.7 note Servlet
uniapp 在app端page选择器没有效果
[mit 6.s081] LEC 8: page faults notes
常用词词性表