当前位置:网站首页>Log4j epic loopholes, big companies like jd.com have been recruited
Log4j epic loopholes, big companies like jd.com have been recruited
2022-07-27 18:40:00 【Java sharing Officer】
Last night there was a Apache Log4j2 High risk vulnerabilities have been exposed , This remote code execution vulnerability is an epic vulnerability .
Apache Log4j2 How many companies are using this component , I don't need to say more about this , There are too many . I don't know how many programmers got up in the middle of the night last night to change their code ?

The official expression of the vulnerability principle is :Apache Log4j2 in JNDI Inject holes , When the program logs the data entered by the user , This vulnerability can be triggered , Successful exploitation of this vulnerability can execute arbitrary code on the target server .
To put it simply, it means : When printing logs , If your blog contains keywords ${ , The attacker can replace the content contained in the keyword as a variable with any attack command , And perform .

Vulnerability detection scheme
1、 Monitor whether there is relevant information through flow monitoring equipment DNSLog Domain name request
2、 By monitoring whether there is... In the relevant logs “jndi:ldap://”、“jndi:rmi” Wait for characters to find possible attacks .
Bug fixes
Apache The official has released a test patch , The successful users should upgrade the latest security version ,
Patch download :https://github.com/apache/logging-log4j2/releases/tag/log4j-2.15.0-rc1

Encounter such a wide range of vulnerabilities , For white hat, it's Chinese New Year . Batch brush vulnerability 、 Batch submission vulnerability , Party a SRC The bosses hurry to hand in the rice , This wave is enough to eat for half a year ~~
It's already coming out of the circle , The next hole to feed safety engineers is log4j !

But just when everyone was ready to submit vulnerabilities , Suddenly found this loophole, people won't accept it !


Wanting is also , This loophole has been made public , Isn't it a waste of your budget to let everyone submit it like this .



source :
https://mp.weixin.qq.com/s/k2LeP612Hdmvyi6LS1qX-g
边栏推荐
- Solve the problem of JSP cascading
- [MIT 6.S081] Lab 7: Multithreading
- Idea packaging war package and war package location
- Using Jieba and pyhanlp tools to extract keyword words and sentences
- Solution to invalid SQL Server connection to server
- 2. Change color space and color detection
- [MIT 6.S081] Lec 4: Page tables 笔记
- 2021.7.18 notes MySQL data type
- Run the uniapp to the mobile phone (real machine debugging)
- [MIT 6.S081] Lab8: locks
猜你喜欢

2021.8.7 note Servlet
![[mit 6.s081] LEC 3: OS organization and system calls notes](/img/34/073d00245eb39844bbe1740f65fe07.png)
[mit 6.s081] LEC 3: OS organization and system calls notes

Log4j 史诗级漏洞,京东这样的大厂都中招了

Knowledge map pyhanlp realizes named body recognition (with named body recognition code)

2021.7.28 notes
![[MIT 6.S081] Lab 10: mmap](/img/5d/a59a6f723518553b9232bc09991075.png)
[MIT 6.S081] Lab 10: mmap

如何实现Word、PDF、TXT文件的全文内容检索?
![[MIT 6.S081] Lab 7: Multithreading](/img/f4/26e513fb8678a88cfba29c1a636b37.png)
[MIT 6.S081] Lab 7: Multithreading

知识图谱 — jieba、pyhanlp、smoothnlp工具实现中文分词(词性表)

搭建一个简单的知识问答系统
随机推荐
[mit 6.s081] LEC 9: interrupts notes
MySQL learning Day1 DDL, DML, DQL basic query
2021.7.18笔记 mysql数据类型
2021.7.17 notes MySQL other commands
2021.7.13 note sub query
机器学习分类任务效果评估指标大全(包含ROC和AUC)
Generate PDM file from Navicat export table
[MIT 6.S081] Lec 10: Multiprocessors and locking 笔记
2021.7.30笔记 索引
mysql基础语句
2021.8.6笔记 jsoup
Wechat applet wxacode.getunlimited generates applet code
[MIT 6.S081] Lab 4: traps
Lotcode dynamic array exercise (724118766)
Log4j 史诗级漏洞,京东这样的大厂都中招了
[MIT 6.S081] Lab 10: mmap
[MIT 6.S081] Lab 3: page tables
2021.7.22 note constraints
一个案例理解mysql视图
Part of speech list of common words