| Vulnerability Name | Remote code execution in Apache Java logging library Log4j |
| Original Issue Date | December 10, 2021 |
| Severity Rating | High |
| Systems Affected | Various implementations of Apache Log4j versions between 2.0 and 2.14.1 |
| CVE Name | CVE-2021-44228 |
Overview
CERT-In has reported a vulnerability in Apache Java logging library Log4j which could allow a remote attacker to gain full control on the targeted servers.
Description
This Vulnerability exists in Apache Java logging library Log4j due to logging of user-controlled strings. A remote attacker could exploit this vulnerability by injecting a specially crafted malicious payload. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code and lead to gain full control on the targeted servers.
Note: This vulnerability is being actively exploited in the wild.
Solution
Apply appropriate patches/mitigation steps as mentioned by various vendors
References
https://logging.apache.org/log4j/2.x/security.html
https://www.lunasec.io/docs/blog/log4j-zero-day/
https://github.com/tangxiaofeng7/apache-log4j-poc
https://www.randori.com/blog/cve-2021-44228/
https://www.crowdstrike.com/blog/log4j2-vulnerability-analysis-and-mitigation-recommendations
https://kc.mcafee.com/corporate/index?page=content&id=KB9509