5.9
CVSSv3

CVE-2021-45105

Published: 18/12/2021 Updated: 06/10/2022
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 5.9 | Impact Score: 3.6 | Exploitability Score: 2.2
VMScore: 405
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

Apache Log4j2 versions 2.0-alpha1 up to and including 2.16.0 (excluding 2.12.3 and 2.3.1) did not protect from uncontrolled recursion from self-referential lookups. This allows an attacker with control over Thread Context Map data to cause a denial of service when a crafted string is interpreted. This issue was fixed in Log4j 2.17.0, 2.12.3, and 2.3.1.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache log4j

netapp cloud manager -

debian debian linux 10.0

debian debian linux 11.0

sonicwall network security manager

sonicwall email security

sonicwall web application firewall

sonicwall 6bk1602-0aa12-0tp0_firmware

sonicwall 6bk1602-0aa22-0tp0_firmware

sonicwall 6bk1602-0aa32-0tp0_firmware

sonicwall 6bk1602-0aa42-0tp0_firmware

sonicwall 6bk1602-0aa52-0tp0_firmware

oracle e-business suite 12.2

oracle retail back office 14.1

oracle weblogic server 12.2.1.3.0

oracle webcenter portal 12.2.1.3.0

oracle webcenter sites 12.2.1.3.0

oracle managed file transfer 12.2.1.3.0

oracle retail order broker 16.0

oracle retail integration bus 14.1.3

oracle retail returns management 14.1

oracle retail central office 14.1

oracle primavera unifier 18.8

oracle retail point-of-service 14.1

oracle instantis enterprisetrack 17.1

oracle instantis enterprisetrack 17.2

oracle instantis enterprisetrack 17.3

oracle weblogic server 12.2.1.4.0

oracle business intelligence 5.5.0.0.0

oracle primavera unifier 19.12

oracle communications unified inventory management 7.3.5

oracle webcenter sites 12.2.1.4.0

oracle identity management suite 12.2.1.3.0

oracle data integrator 12.2.1.3.0

oracle flexcube universal banking

oracle banking platform 2.6.2

oracle peoplesoft enterprise peopletools 8.58

oracle utilities framework 4.4.0.0.0

oracle agile plm 9.3.6

oracle webcenter portal 12.2.1.4.0

oracle weblogic server 14.1.1.0.0

oracle communications services gatekeeper 7.0

oracle retail service backbone 14.1.3

oracle primavera unifier 20.12

oracle managed file transfer 12.2.1.4.0

oracle retail order broker 18.0

oracle communications interactive session recorder 6.3

oracle communications interactive session recorder 6.4

oracle retail service backbone 15.0.3.1

oracle retail service backbone 14.1.3.2

oracle primavera gateway

oracle retail price management 14.1.3.0

oracle retail price management 15.0.3.0

oracle retail price management 16.0.3.0

oracle retail order broker 19.1

oracle communications ip service activator 7.4.0

oracle communications performance intelligence center 10.4.0.3

oracle communications evolved communications application server 7.1

oracle communications unified inventory management 7.4.1

oracle communications network integrity 7.3.6

oracle jdeveloper 12.2.1.4.0

oracle data integrator 12.2.1.4.0

oracle banking platform 2.7.1

oracle enterprise manager ops center 12.4.0.0

oracle enterprise manager for peoplesoft 13.4.1.1

oracle enterprise manager base platform 13.5.0.0

oracle enterprise manager base platform 13.4.0.0

oracle peoplesoft enterprise peopletools 8.59

oracle insurance insbridge rating and underwriting 5.6.1.0

oracle agile engineering data management 6.2.1.0

oracle retail merchandising system 16.0.3

oracle utilities framework 4.4.0.2.0

oracle utilities framework 4.4.0.3.0

oracle utilities framework

oracle retail service backbone 19.0.1.0

oracle retail integration bus 14.1.3.2

oracle retail eftlink 16.0.3

oracle retail eftlink 17.0.2

oracle retail eftlink 18.0.1

oracle retail eftlink 19.0.1

oracle retail integration bus 15.0.3.1

oracle financial services model management and governance 8.1.0.0.0

oracle financial services model management and governance 8.0.8.0.0

oracle financial services analytical applications infrastructure

oracle primavera unifier 21.12

oracle siebel ui framework

oracle retail service backbone 19.0.0

oracle retail price management 13.2

oracle retail price management 14.0.4

oracle retail predictive application server 14.1.3.46

oracle retail predictive application server 15.0.3.115

oracle retail predictive application server 16.0.3.240

oracle retail order management system 19.5

oracle retail invoice matching 15.0.3

oracle retail invoice matching 16.0.3

oracle retail integration bus

oracle retail eftlink 20.0.1

oracle financial services model management and governance 8.1.1.0.0

oracle primavera p6 enterprise project portfolio management 21.12.0.0

oracle primavera p6 enterprise project portfolio management

oracle primavera gateway 21.12.0

oracle communications diameter signaling router

oracle communications webrtc session controller 7.2.0.0

oracle communications webrtc session controller 7.2.1

oracle communications service broker 6.2

oracle communications messaging server 8.1

oracle communications convergent charging controller

oracle communications convergent charging controller 6.0.1.0.0

oracle communications convergence 3.0.2.2.0

oracle communications billing and revenue management 12.0.0.4

oracle communications asap 7.3

oracle communications session route manager

oracle communications session report manager

oracle communications element manager

oracle communications eagle ftp table base retrieval 4.5

oracle communications cloud native core security edge protection proxy 1.7.0

oracle communications unified inventory management 7.4.2

oracle communications pricing design center 12.0.0.4

oracle communications pricing design center 12.0.0.5

oracle communications network charging and control

oracle communications network charging and control 6.0.1.0.0

oracle banking platform 2.12.0

oracle banking party management 2.7.0

oracle banking loans servicing 2.12.0

oracle banking enterprise default management 2.7.1

oracle banking enterprise default management 2.12.0

oracle banking deposits and lines of credit servicing 2.12.0

oracle hospitality suite8 8.13.0

oracle hospitality suite8 8.14.0

oracle healthcare translational research 4.1.0

oracle healthcare data repository 8.1.1

oracle insurance insbridge rating and underwriting 5.2.0

oracle retail service backbone

oracle retail service backbone 19.0.1

oracle retail merchandising system 19.0.1

oracle retail integration bus 19.0.1

oracle retail integration bus 19.0.0

oracle retail financial integration 14.1.3.2

oracle retail financial integration 15.0.3.1

oracle retail financial integration 19.0.1

oracle autovue for agile product lifecycle management 21.0.2

oracle agile plm mcad connector 3.6

oracle communications convergence 3.0.3.0

oracle communications billing and revenue management 12.0.0.5

oracle sql developer

oracle communications user data repository 12.4

oracle communications eagle element management system 46.6

oracle communications cloud native core unified data repository 1.15.0

oracle communications cloud native core service communication proxy 1.15.0

oracle communications cloud native core policy 1.15.0

oracle communications cloud native core network slice selection function 1.8.0

oracle communications cloud native core network repository function 1.15.0

oracle communications cloud native core network repository function 1.15.1

oracle communications cloud native core network function cloud native environment 1.10.0

oracle communications cloud native core console 1.9.0

oracle management cloud engine 1.5.0

oracle identity manager connector 9.1.0

oracle identity management suite 12.2.1.4.0

oracle flexcube universal banking 11.83.3

oracle flexcube universal banking 14.5

oracle banking treasury management 14.5

oracle banking trade finance 14.5

oracle banking payments 14.5

oracle enterprise manager for peoplesoft 13.5.1.1

oracle payment interface 19.1

oracle payment interface 20.3

oracle hospitality token proxy service 19.2

oracle healthcare translational research 4.1.1

oracle healthcare master person index 5.0.1

oracle healthcare foundation

oracle health sciences information manager

oracle health sciences inform 6.3.2.1

oracle health sciences inform 7.0.0.0

oracle health sciences inform 6.2.1.1

oracle health sciences empirica signal 9.2.0.0

oracle health sciences empirica signal 9.1.0.6

oracle mysql enterprise monitor

oracle insurance insbridge rating and underwriting

oracle insurance data gateway 1.0.1

oracle hyperion tax provision

oracle hyperion profitability and cost management

oracle hyperion planning

oracle hyperion infrastructure technology

oracle hyperion data relationship management

oracle hyperion bi\\+

oracle retail store inventory management 14.1.3.14

oracle retail store inventory management 14.1.3.5

oracle retail store inventory management 15.0.3.3

oracle retail store inventory management 15.0.3.8

oracle retail store inventory management 16.0.3.7

oracle retail store inventory management 14.0.4.13

oracle retail financial integration

oracle retail financial integration 19.0.0

oracle retail eftlink 21.0.0

oracle retail data extractor for merchandising 15.0.2

oracle retail data extractor for merchandising 16.0.2

oracle retail customer insights 16.0.2

oracle retail customer insights 15.0.2

oracle taleo platform

Vendor Advisories

Debian Bug report logs - #1001891 apache-log4j2: CVE-2021-45105: Certain strings can cause infinite recursion Package: src:apache-log4j2; Maintainer for src:apache-log4j2 is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 18 Dec 2 ...
It was found that Apache Log4j2, a Logging Framework for Java, did not protect from uncontrolled recursion from self-referential lookups When the logging configuration uses a non-default Pattern Layout with a Context Lookup (for example, $${ctx:loginId}), attackers with control over Thread Context Map (MDC) input data can craft malicious input dat ...
Synopsis Low: Red Hat Single Sign-On 752 security update on RHEL 8 Type/Severity Security Advisory: Low Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic New Red Hat Single Sign-On 752 packages are now available for Red Hat Enterprise Linux 8Red Hat Product Sec ...
Synopsis Low: Red Hat Single Sign-On 752 security update Type/Severity Security Advisory: Low Topic A security update is now available for Red Hat Single Sign-On 75 from the Customer PortalRed Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) base score, which gives ...
Synopsis Low: Red Hat Single Sign-On 752 security update on RHEL 7 Type/Severity Security Advisory: Low Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic New Red Hat Single Sign-On 752 packages are now available for Red Hat Enterprise Linux 7Red Hat Product Sec ...
Synopsis Low: Red Hat JBoss Enterprise Application Platform 744 security update Type/Severity Security Advisory: Low Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic A security update is now available for Red Hat JBoss Enterprise Application Platform 74 for Red ...
Synopsis Low: Red Hat JBoss Enterprise Application Platform 744 security update Type/Severity Security Advisory: Low Topic A security update is now available for Red Hat JBoss Enterprise Application Platform 74Red Hat Product Security has rated this update as having a security impact of Low A Common Vulnerability Scoring System (CVSS) ba ...
Synopsis Low: Red Hat JBoss Enterprise Application Platform 744 security update Type/Severity Security Advisory: Low Red Hat Insights patch analysis Identify and remediate systems affected by this advisory View affected systems Topic A security update is now available for Red Hat JBoss Enterprise Application Platform 74 for Red ...
A flaw was found in the Apache Log4j logging library 2x when the logging configuration uses a non-default Pattern Layout with a Context Lookup Attackers with control over Thread Context Map (MDC) input data can craft malicious input data that contains a recursive lookup and can cause Denial of Service (CVE-2021-45105) ...
Critical Vulnerabilities in Apache Log4j Java Logging Library On December 9, 2021, the following critical vulnerability in the Apache Log4j Java logging library affecting all Log4j2 versions earlier than 2150 was disclosed: CVE-2021-44228: Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoin ...
A flaw was found in the Apache Log4j logging library 2x when the logging configuration uses a non-default Pattern Layout with a Context Lookup Attackers with control over Thread Context Map (MDC) input data can craft malicious input data that contains a recursive lookup and can cause Denial of Service (CVE-2021-45105) ...
ALAS-2022-225 Amazon Linux 2022 Security Advisory: ALAS-2022-225 Advisory Release Date: 2022-12-06 16:42 Pacific ...
Citrix is aware of four vulnerabilities affecting Apache Log4j2, three of which may allow an attacker to execute arbitrary code These three vulnerabilities have been given the following identifiers:  ...

Github Repositories

Replicating CVE-2021-45105

tejas-nagchandi/CVE-2021-45105 Replicating CVE-2021-45105 API curl -I localhost:8080/currentDateTime -H 'Time-Zone: GMT' Output: Attack curl -I localhost:8080/currentDateTime -H 'Time-Zone: ${${::-${::-$${::-$}}}}' Output: Logs: Reference: cvemitreorg/cgi-bin/cvena

Sample Log4j2 vulnerable application (CVE-2021-45105) Versions Affected: all versions from 20-beta9 to 2160 This application is based on Spring Boot web application vulnerable to CVE-2021-45105 It uses Log4j 2160 Running the application Run it: Import the project in Java IDE as a maven project Run CVEMainApplicationjava as a spring boot app

Log4J vulnerability Script to remove the "JndiLookup.Class" from JAR-files

Remove-Log4JVulnerabilityClass- Log4J vulnerability Script to remove the "JndiLookupClass" from JAR, WAR and other Java related files SCRIPTS: There is two diffent type of PS scripts Output examles are add beside the scripts Remove-Log4J_JndiLookupClass-PSv5ps1 (Outdated) This script can only run locally on a computer Remove-Log4J_JndiLookupClassRemotely-PSv5ps1

appsecutil This repo contains utility to pull AppSec data from Dynatrace using REST API In order to use this utility, you would need 2 items: Name Description Dynatrace tenant url Managed {your-domain}/e/{your-environment-id} SaaS {your-environment-id}livedynatracecom API Token You need the Write configuration (WriteConfig) permission assigned to y

DEPRECATED: this application is deprecated and thus will not receive fixes or security updates. It is archived for educational purposes, but may not function.

Watson Assistant (formerly Conversation) with Discovery This application demonstrates how you can combine the Watson Assistant and Discovery services to allow customers, employees or the public to get answers to a wide range of questions about a product, service or other topic using plain English First, users pose a questions to the Watson Assistant service If Watson Assista

Sourced from githubcom/N-able/CustomMonitoring/tree/master/Vulnerability%20-%20CVE-2021-44228%20(Log4j) Name: get-log4jrcevulnerabilityps1 Version: 0243 (23rd December 2021) Author: Prejay Shah (Doherty Associates) Thanks: Christopher Bledsoe (IPM Computers) for some bugfixes, Robby Swartenbroekx (b-Inside) for some ideas, Arctic Wolf for coming up with a way to de

E-commerce web simulation. Dockerized services, load balancer, redis... Developmenf of distributed applications, 2021 📡

- This project is most likely affected by the CVE-2021-45105 vulnerability and is not updated! Click & Buy Simulación de compra y venta online Reportar un bug · Solicitar una nueva funcionalidad Tabla de contenidos Acerca del proyecto Tecnol

appsecutil This repo contains utility to pull AppSec data from Dynatrace using REST API In order to use this utility, you would need 2 items: Name Description Dynatrace tenant url Managed {your-domain}/e/{your-environment-id} SaaS {your-environment-id}livedynatracecom API Token You need the Write configuration (WriteConfig) permission assigned to y

This repository contains helper scripts for log4j security issues.

log4j-CVEs-scripts This repository contains helper scripts for log4j security issues log4j-CVE-2021-45105-finderpy: Script to find potentially vulnerable patterns in log4j configuration

henlo_there bitly/x0o12 If you're reading this file, then you have been effected by the log4j vulnerability (CVE-2021-45105) Next steps loggingapacheorg/log4j/2x/securityhtml

Sample Log4j2 vulnerable application (CVE-2021-45105) Versions Affected: all versions from 20-beta9 to 2160 This application is based on Spring Boot web application vulnerable to CVE-2021-45105 It uses Log4j 2160 Running the application Run it: Import the project in Java IDE as a maven project Run CVEMainApplicationjava as a spring boot app

A poc to understand the impact of log4j-shell

Showcase log4j vulnerability Updates 2021-12-20: added working exampele for DoS based on log4j 2160 This repo is for educational purposes I do neither endorse nor encourage any mailicious use of this repo It requires a Kubernetes environment to run the app and the tests Credits go to Eden Federman and Christophe Tafani-Dereeper, Tejas Nagchandi their repos/posts gave me

Log4j_dos_CVE-2021-45105

Log4j2 DOS (CVE-2021-45105) Poc ${${::-${::-$${::-$}}}} Versions Affected: all versions from 20-beta9 to 2160 This application is based on Spring Boot web application vulnerable to CVE-2021-45105 It uses Log4j 2160 Running the application Run it: Import the project in Java IDE as a maven project Run CVEMainApplicationjava as a spr

log4j2 dos exploit,CVE-2021-45105 exploit,Denial of Service poc

说明 about author: 我超怕的 blog: wwwcnblogscom/iAmSoScArEd/ github: githubcom/iAmSOScArEd/ date: 2021-12-20 log4j2 dos exploit log4j2 dos 漏洞利用脚本 CVE-2021-45105 Exploit CVE-2021-45105 利用脚本 利用方式 how to use English: Log4j2_dospy -u <url> -m <method> -d <params> -H <header&

Connector between Azure Digital Twins and CosmoTech Simulator

Azure Digital Twins connector The aim of this project is to : read data from an ADT flatten these data in a list of CSVData Pojo defined in the library simulator-connector-commons Export Csv Files containing these data Changelog Version 250 New Features Add filters for twins and relationships which enable subgraph querying of an ADT instance: NB: Filter conditional is d

Log4Shell Demo with AWS

Log4Shell(CVE-2021-44228) Demo Environment Setup Client Anywhere that with ability to access the HTTP Server with curl command line Vulnerable App by Http Server with log4j Amazon Linux 2 (x86 based) EC2 Instance / CentOS Azure Virtual Machine $ yum install docker -y $ systemctl enable docker $ systemctl start docker $ docker run --name vulnerable-app -p 8080:8080 ghcrio/

log4j-tools Quick links Click to find: Inclusions of log4j2 in compiled code Calls to log4j2 in compiled code Calls to log4j2 in source code Sanity check for env mitigations Applicability of CVE-2021-45046 Xray wrapper for Log4Shell Automatically patch container images in Artifactory Overview CVE-2021-44228 poses a serious threat to a wide range of Java-based appl

Curated list of GitHub projects I starred over the years

Awesome Stars A curated list of my GitHub stars! Generated by starred Contents API Blueprint ActionScript ApacheConf Astro C C# C++ CSS Clojure CoffeeScript Crystal DIGITAL Command Language Dart Dockerfile Elixir Elm Erlang FreeMarker Go HTML Handlebars Haskell Java JavaScript Jupyter Notebook Kotlin Less LiveScript Lua MATLAB MDX Makefile Markdown Mustache Nunjucks OCaml

🚨 Log4Shell: CVE-2021-44228 🚨 ❓ What is Log4Shell? The Log4Shell attack was a widespread Java exploit targeting a common logging package (Log4j) for remote code execution It leveraged a critical vulnerability in the Log4j library, enabling attackers to execute arbitrary code remotely via crafted log messages Despite the ubiquity of Log4j in various software frameworks

Operational information regarding the log4shell vulnerabilities in the Log4j logging library.

Log4shell vulnerabilities (CVE-2021-44228, CVE-2021-45046, CVE-2021-4104, CVE-2021-45105) This repo contains operational information regarding the Log4shell vulnerability in the Log4j logging library Especially CVE-2021-44228 / CVE-2021-45046 and also covers CVE-2021-4104 / CVE-2021-45105 For additional information see: NCSC-NL advisory MITRE CSIRT network members advisories

CUBETIQ Security Advisors and Guidelines for Response and Resolves Common Vulnerabilities and Exposures

CUBETIQ Security Advisors CUBETIQ Security Advisors and Guidelines for Response and Resolves Common Vulnerabilities and Exposures Alerts CVE-2021-44228 (10/12/2021) CVE-2021-45046 (14/12/2021) CVE-2021-45105 (18/12/2021) CVE-2021-42550 (16/12/2021) Contributors Sambo Chea sombochea@cubetiqscom

Security Research and PoC

Security Research and PoC Log4Shell Analysis Log4Shell (CVE-2021-44228) Log4Shell Follow Up (CVE-2021-45046 and CVE-2021-45105) JNDI/LDAP Remote Code Execution (JNDI LDAP RCE vulnerability using Jackson) Jackson exploit leading to RCE (Another example of Jackson based RCE) Research on Prototype Pollution in Nodejs applications JavaScript Prototype Pollution (Analysis of Pro

Log4j RCE Research Lab 🚧 A basic research lab to learn more about Log4Shell: CVE-2021-45105 CVE-2021-45046 CVE-2021-44228 Used By Microsoft Sentinel To-Go! CVE-2021-44228-Log4Shell Demo Deploy LDAP Reference & Web Servers Clone Repo sudo su git clone githubcom/zeroonesa/ctf_log4jshell Run Docker Compose File cd ctf

A public open sourced tool. Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! TAG_OS_TOOL, OWNER_KELLY, DC_PUBLIC

Log4-detector Scanner that detects vulnerable Log4J versions to help teams assess their exposure to CVE-2021-44228 (CRITICAL), CVE-2021-45046, CVE-2021-45105, and CVE-2021-44832 Can search for Log4J instances by carefully examining the complete file-system, including all installed applications It is able to find Log4J instances that are hidden several layers deep Works on Li

A tool that scans archives to check for vulnerable log4j versions

log4j-sniffer log4j-sniffer crawls for all instances of log4j on disk within a specified directory It can be used to determine whether there are any vulnerable instances of log4j within a directory tree and report or delete them depending on the mode used Scanning for versions affected by CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 and CVE-2021-44832 is currently supported

Scan systems and docker images for potential log4j vulnerabilities. Able to patch (remove JndiLookup.class) from layered archives. Will detect in-depth (layered archives jar/zip/tar/war and scans for vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105). Binaries for Windows, Linux and OsX, but can be build on each platfo…

divd-2021-00038--log4j-scanner This scanner will recursively scan paths including archives for vulnerable log4j versions and org/apache/logging/log4j/core/lookup/JndiLookupclass files Currently the allow list defines non exploitable versions, in this case log4j-core 2170 and 2123

Choose your own SIEM adventure Repo of configs for the three major SIEMs Blog posts: Elastic Graylog Splunk Security notes Default password is set to Changem123! Docker-composes v2X are for development ONLY and are NOT secure for production Config direcotry: conf/ conf/ansible/* - This directory contains all the configs for the Ansible playbooks and a manual install con

Patching the Log4j vulnerability in Gluu Server Gluu Server versions covered: Gluu v4, v3 ( from 315 to 318 ), Enterprise Edition, Cloud Native and Snapcraft Security Vulnerabilities: CVE-2021-44832, CVE-2021-45105, CVE-2021-45046 and CVE-2021-44228 Log4j library versions affected: 216 and earlier   Overview: On December 17th, Apache announced critical vulnerabi

Conftest Snyk Demos The following demos show how to use conftest with Snyk to break builds based on certain conditions Conftest is a utility to help you write tests against structured configuration data For instance, you could write tests for your Kubernetes configurations, Tekton pipeline definitions, Terraform code, Serverless configs or any other structured data In this c

This repository is designed to be a collection of resources to learn about, detect and mitigate the impact of the Log4j vulnerability - more formally known as CVE-2021-44228 and CVE-2021-45046 (mirror from GitLab.com)

💡 Log4j CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 Resources This repository is designed to be a collection of resources to learn about, detect and mitigate the impact of the Log4j vulnerability - more formally known as CVE-2021-44228 Below you can find a set of links to resources organized by topic area If you want to add resources, you can fork this repository on Gi

Goal Configure dependency-check-maven in a parent POM, allowing suppressions to be loaded from a known location (src/build/suppressionsxml) in a child project (if defined), based on the configuration described in jeremylong/DependencyCheck#3947 (comment) Running the reactor build: Note that the suppressions are not loaded (for the full output with debug logging turned on see

The official Peppol, TOOP and DE4A Directory software

phoss-directory The official Peppol Directory (PD; directorypeppoleu), TOOP Directory software (The Once-Only Project; wwwtoopeu) and DE4A Directory software (Digital Europe 4 All; wwwde4aeu) It is split into the following sub-projects (all require Java 11 or newer): phoss-directory-indexer - the PD indexer part phoss-directory-publisher - the PD publisher web

A sample project to debunk common misbeliefs regarding the impact the Log4j vulnerabilities on Java Applications.

Introduction This project intends to debunk two common misbeliefs regarding the impact of the recently discovered Log4j 2x vulnerabilities on JVM applications for two typical scenarios, as reported in the following CVE records: CVE-2021-44228 CVE-2021-45046 CVE-2021-45105 The first two, famously nicknamed Log4Shell, enable Remote-Code-Execution, whereas the last one allows a

Operational information regarding the log4shell vulnerabilities in the Log4j logging library.

Log4shell vulnerabilities (CVE-2021-44228, CVE-2021-45046, CVE-2021-4104, CVE-2021-45105) This repo contains operational information regarding the Log4shell vulnerability in the Log4j logging library Especially CVE-2021-44228 / CVE-2021-45046 and also covers CVE-2021-4104 / CVE-2021-45105 For additional information see: NCSC-NL advisory MITRE EU CSIRT network members advisor

Patch Pulsar Docker images with Log4J 2.17.1 update to mitigate Apache Log4J Security Vulnerabilities including Log4Shell

Patch pulsar images with Apache Log4J 2171 upgrade Covers CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 CVE-2021-44832 See Log4J Security Vulnerabilities and upgrades for more information see the Dockerfile for the solution Building and pushing patched docker images example usage: # build and tag image docker build --build-arg=ORIGINAL_IMAGE=apachepulsar/pulsar-all:281

Scanner recursivo de arquivos desenvolvido em Python 3 para localização e varredura de versões vulneráveis do Log4j2, contemplando análise interna de arquivos JAR (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 e CVE-2021-44832)

████████████████▀███████████████████████████████████████████████████████████████████ █▄─▄███─▄▄─█─▄▄▄▄█░█░████▄─▄█▀▀▀▀▀██▄─▄▄─█

CUBETIQ Security Advisors and Guidelines for Response and Resolves Common Vulnerabilities and Exposures

CUBETIQ Security Advisors CUBETIQ Security Advisors and Guidelines for Response and Resolves Common Vulnerabilities and Exposures Alerts CVE-2021-44228 (10/12/2021) CVE-2021-45046 (14/12/2021) CVE-2021-45105 (18/12/2021) CVE-2021-42550 (16/12/2021) Contributors Sambo Chea sombochea@cubetiqscom

Test this content before applying it to production systems Usage Download the latest package from releases here: githubcom/VerveIndustrialProtection/CVE-2021-44228-Log4j/releases and then Import the Fixlets, Analyses, and Computer Group into a site and apply computer subscriptions Detection Methods There are three detection methods available for each supported Operat

A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner

Log4Shell Sentinel - A Smart CVE-2021-44228 Scanner Introduction While there have some excellent tools released to help organizations scan their environments for applications vulnerable to the critical Log4J / CVE-2021-44228 vulnerability, I felt that: none of the tools I ran into were made for analysts to track a given finding throughout the remediation process Log4Shell Sen

A standard pkg installer to apply the IBM SPSS Statistics log4j fixes.

Fix pack for SPSS log4j vulnerabilities Applies the log4j 2171 fixes recomended by IBM for log4j vulnerabilities (Security bulletin copied below) There is a prebuilt signed pkg located in the build directory You can deploy it using whatever means ** created using munkipkg Document Source: wwwibmcom/support/pages/apache-log4j-cve-2021-44228-vulnerability-ibm-spss

Scanner to send specially crafted requests and catch callbacks of systems that are impacted by log4j log4shell vulnerability and to detect vulnerable log4j versions on your local file-system

scan4log4shell Scanner to send specially crafted requests and catch callbacks of systems that are impacted by log4j log4shell vulnerability and to detect vulnerable log4j versions on your local file-system Features Local and remote scanner Supports URL and CIDR scans Supports DNS, LDAP & TCP callbacks for vulnerability discovery and validation Fuzzing of 50 HTTP requ

Use Log4Shell vulnerability to vaccinate a victim server against Log4Shell

Logout4Shell Description A vulnerability impacting Apache Log4j versions 20 through 2141 was disclosed on the project’s Github on December 9, 2021 The flaw has been dubbed “Log4Shell,”, and has the highest possible severity rating of 10 Software made or managed by the Apache Software Foundation (From here on just "Apache") is pervasive and comp

Log4shell vulnerabilities (CVE-2021-44228, CVE-2021-45046, CVE-2021-4104, CVE-2021-45105) This repo contains operational information regarding the Log4shell vulnerability in the Log4j logging library Especially CVE-2021-44228 / CVE-2021-45046 and also covers CVE-2021-4104 / CVE-2021-45105 For additional information see: NCSC-NL advisory MITRE EU CSIRT network members advisor

Log4shell vulnerabilities (CVE-2021-44228, CVE-2021-45046, CVE-2021-4104, CVE-2021-45105) This repo contains operational information regarding the Log4shell vulnerability in the Log4j logging library Especially CVE-2021-44228 / CVE-2021-45046 and also covers CVE-2021-4104 / CVE-2021-45105 For additional information see: NCSC-NL advisory MITRE CSIRT network members advisories

Playbooks for setting up a Red Hat Advanced Cluster Security demo/workshop for log4shell vulnerability

Red Hat Advanced Cluster Security workshop - Run-Time Log4Shell Vulnerability Prevention Demo Overview Run-Time Vulnerability Prevention demonstrates the capabilities of Red Hat Advanced Cluster Security for cloud native applications in OpenShift and any xKS environment The industry is quickly moving to a DevSecOps Model, and shifting security to the left to secure build, depl

Modern Java/JVM Build Practices

Modern Java/JVM Build Practices Modern Java/JVM Build Practices is an article-as-repo on building modern Java/JVM projects using Gradle and Maven, and a starter project for Java The focus is best build practices and project hygiene This document is agnostic between Gradle and Maven: discussion in each section covers both tools (alphabetical order, Gradle before Maven) S

Supplier Product Version (see Status) Status CVE-2021-4104 Status CVE-2021-44228 Status CVE-2021-45046 Status CVE-2021-45105 Notes Links Alphatron Alphatron Repeater Display MFS-VJ all Not vuln Not vuln Not vuln Not vuln Alphatron Alphatron Repeater Display MFS-VR all Not vuln Not vuln Not vuln Not vuln Alphatron Alphatron Repeater Display MFS all Not vuln Not vuln

EFK 설치 가이드 개요 EFK는 Elasticsearch, Fluentd 그리고 Kibana 세 개의 플랫폼 조합으로 클러스터 환경에서의 로그 수집, 검색 그리고 시각화를 제공한다 각 k8s 클러스터에 fluentd가 daemonset으로 log를 수집하여 elasticsearch에 적재하면, elasticsearch는 요청에 따른 검색 기능을 제공한다 kibana는 elast

Detections for CVE-2021-44228 inside of nested binaries

Log4J-CVE-Detect This repository contains a set of YARA rules for detecting versions of log4j which are vulnerable to CVE-2021-44228, CVE-2021-45046, and / or CVE-2021-45105 by looking for a number of features which appear in affected versions This tool works recursively on binary files such as Docker images, system packages, filesystem images, and even installation media See

Log4shell vulnerabilities (CVE-2021-44228, CVE-2021-45046, CVE-2021-4104, CVE-2021-45105) This repo contains operational information regarding the Log4shell vulnerability in the Log4j logging library Especially CVE-2021-44228 / CVE-2021-45046 and also covers CVE-2021-4104 / CVE-2021-45105 For additional information see: NCSC-NL advisory MITRE EU CSIRT network members advisor

Playbooks for setting up a Red Hat Advanced Cluster Security demo/workshop for log4shell vulnerability

Red Hat Advanced Cluster Security workshop - Run-Time Log4Shell Vulnerability Prevention Demo Overview Run-Time Vulnerability Prevention demonstrates the capabilities of Red Hat Advanced Cluster Security for cloud native applications in OpenShift and any xKS environment The industry is quickly moving to a DevSecOps Model, and shifting security to the left to secure build, depl

Log4Shell (CVE-2021-44228): Descrizione, Exploitation e Mitigazione

CVE-2021-44228 Il 9 dicembre 2021 il mondo è venuto a conoscenza di una nuova falla di sicurezza riguardante Log4J Il punteggio CVSSv3 (Common Vulnerability Scoring System) della vulnerabilità, è stato valutato pari a 10, rendendola così di livello critico (nvdnistgov/vuln/detail/CVE-2021-44228) CVSSv3 Il suo vettore CVSSv3 è il

Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or "that Log4j JNDI exploit" by inspecting the class paths inside files

log4shelldetect Scans a file or folder recursively for Java programs that may be vulnerable to: CVE-2021-44228 (Log4Shell) (v20x - v214x) CVE-2021-45046 (v215x) CVE-2021-45105 (v216x)1 by inspecting the class paths inside files If you only want possibly vulnerable files to be printed rather than all files, run with -mode list Usage Usage: log4shelldetect [options]

Contains all my research and content produced regarding the log4shell vulnerability

Objective Contains all my research and content produced regarding the log4shell vulnerability Content Folder "analysis" Contain the information that I gather about the vulnerability, affected versions, exploitation context/requirements, remediation plan proposal and so on This content is created using Joplin and then exported as markdown to the analysis folder

Log4Shell Research Lab 🚧 A basic research lab to learn more about Log4Shell: CVE-2021-45105 CVE-2021-45046 CVE-2021-44228 Used By Microsoft Sentinel To-Go! Log4Shell Demo Research notes I took the following notes while learning about Log4Shell I hope they are helpful! 🍻 Depending on which CVE you want to test, use the following research notes to simulate a few scen

The complete ph websuite

ph-oton This set of Java libraries forms a package to build Java web applications Contained subprojects are: ph-oton-html - Java wrapper for all HTML elements and attributes ph-oton-jscode - a Java code model to build structured JS code ph-oton-jquery - an extension to ph-html-jscode to also support jQuery ph-oton-atom - ATOM newsfeed stuff ph-oton-io - basic IO stuff (sinc

Log4shell vulnerabilities (CVE-2021-44228, CVE-2021-45046, CVE-2021-4104, CVE-2021-45105) This repo contains operational information regarding the Log4shell vulnerability in the Log4j logging library Especially CVE-2021-44228 / CVE-2021-45046 and also covers CVE-2021-4104 / CVE-2021-45105 For additional information see: NCSC-NL advisory MITRE EU CSIRT network members advisor

Log4j2 fix

Mule patcher A simple script that patches Mule anypoint studio, but it can be adapted for other projects as well Mule seems to work after the patch though deep dives need to be done for each application Note that the scala log4j drivers have not been patched yet Legal This is a quick and dirty tool, free to use and comes with NO WARRANTY at all Use at your own risk! Usage S

Silent print and serial ports for web!

WebApp Hardware Bridge Security Warning Version <= 0130 are known to be affected by log44 vulnerabilities (CVE-2021-44228, CVE-2021-45105, CVE-2021-45046) Existing users are strongly recommended to update to 0140 or above as soon as possible Introduction WebApp Hardware Bridge (succeeder of "Chrome Hardware Bridge / Chrome Direct Print") Make it possible

Playbooks for setting up a Red Hat Advanced Cluster Security demo/workshop for log4shell vulnerability

Red Hat Advanced Cluster Security workshop - Run-Time Log4Shell Vulnerability Prevention Demo Overview Run-Time Vulnerability Prevention demonstrates the capabilities of Red Hat Advanced Cluster Security for cloud native applications in OpenShift and any xKS environment The industry is quickly moving to a DevSecOps Model, and shifting security to the left to secure build, depl

Log4shell vulnerabilities (CVE-2021-44228, CVE-2021-45046, CVE-2021-4104, CVE-2021-45105) This repo contains operational information regarding the Log4shell vulnerability in the Log4j logging library Especially CVE-2021-44228 / CVE-2021-45046 and also covers CVE-2021-4104 / CVE-2021-45105 For additional information see: NCSC-NL advisory MITRE CSIRT network members advisories

Detections for CVE-2021-44228 inside of nested binaries

Log4J-CVE-Detect This repository contains a set of YARA rules for detecting versions of log4j which are vulnerable to CVE-2021-44228, CVE-2021-45046, and / or CVE-2021-45105 by looking for a number of features which appear in affected versions This tool works recursively on binary files such as Docker images, system packages, filesystem images, and even installation media See

This elasticsearch image v7102 is patched against following log4j vulnerabilities: CVE-2021-44228 CVE-2021-45046 CVE-2021-45105 Since the only two latest versions 7162 and 6822 of elasticsearch were patched by vendor, but numerous products use exclusively interim releases (ie graylog), we've decided to release a patched image, although is the image according to e

Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)

log4j-finder A Python3 script to scan the filesystem to find Log4j2 that is vulnerable to Log4Shell (CVE-2021-44228 & CVE-2021-45046 & CVE-2021-45105) It scans recursively both on disk and inside (nested) Java Archive files (JARs) How it works log4j-finder identifies log4j2 libraries on your filesystem using a list of known bad and known good MD5 hashes of sp

Log4jSherlock Version 1020211219 Overview Log4j Scanner coded in Powershell, so you can run it in windows! This tool scans for JAR, WAR, EAR, JPI, HPI that contain the effected JndiLookupclass even in nested files Scans nested files searches for the effected JNDI class pulls version and reports in CSV, JSON, and txt log reports error ie access issues to folders where

A tool that upgrades the log4j from an Oxygen installation to version 2.17.1

Oxygen XML Patch Tool for Apache Log4j vulnerability CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105 This is a tool that updates the log4j version 2 library to version 2171 in an: Oxygen XML Editor/Author/Developer standalone installation, or Oxygen XML Editor/Author/Developer plugin for Eclipse installation, or Oxygen PDF Chemistry installation, or Oxygen Publishing Engin

🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks

🤝 Show your support - give a ⭐️ if you liked the content | SHARE on Twitter | Follow me on 🐱‍💻 ✂️ 🤬 LOG4J Java exploit - WAF and patches bypass tricks 📝 Description CVE-2021-44228 works on: log4j: 20 <= Apache log4j <= 2141 Java version already patched: 6u211+, 7u201+, 8u191+, 1101+ Windows Defender started to remove java f

log4j2demo

Apache log4j2 远程命令执行漏洞 2021-12-27 重要更新: 根据官网消息,2160和2170版本包暴露了新的漏洞(CVE-2021-45105)和(CVE-2021-44832)。建议升级到2171版本。 2021-12-18重要更新: 根据Apache Log4j2官网信息,针对漏洞CVE-2021-44228的临时规避方案,除了删除class之外,其他设置formatMsgNoLookups等环境变

🤝 Show your support - give a ⭐️ if you liked the content | SHARE on Twitter | Follow me on 🐱‍💻 ✂️ 🤬 LOG4J Java exploit - WAF and patches bypass tricks 📝 Description CVE-2021-44228 works on: log4j: 20 <= Apache log4j <= 2141 Java version already patched: 6u211+, 7u201+, 8u191+, 1101+ Windows Defender started to remove java f

Scanner recursivo de arquivos desenvolvido em Python 3 para localização e varredura de versões vulneráveis do Log4j2, contemplando análise interna de arquivos JAR (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105 e CVE-2021-44832)

████████████████▀███████████████████████████████████████████████████████████████████ █▄─▄███─▄▄─█─▄▄▄▄█░█░████▄─▄█▀▀▀▀▀██▄─▄▄─█

Scans the file system to find Log4Shell vulnerabilities.

Log4Shell Scanner Log4Shell Scanner (log4shell-scanner-rs) is a CLI application written in Rust It scans the file system to find Java applications that may be vulnerable to Log4Shell related vulnerabilities (CVE-2021-44228, CVE-2021-45046, CVE-2021-45105, CVE-2021-44832) Detail of Log4Shell vulnerabilities affecting Log4j2: CVE Severity Fix version (min Java version)

Java代码审计手册,关注于漏洞挖掘而非利用【持续更新】

Java代码审计手册 【声明】个人的快速查询手册,经验整理,仅供参考。 【内容】本手册主要关注于Java漏洞挖掘而非利用,漏洞利用在WEB 安全手册有总结。复现案例分析也是关注漏洞原理,通过调试分析加强对漏洞产生模式理解,辅助漏洞挖掘。 0x00 环境准备篇 Idea,VSCode Java调试环境

Sample Log4j2 vulnerable application (CVE-2021-45105) Versions Affected: all versions from 20-beta9 to 2160 This application is based on Spring Boot web application vulnerable to CVE-2021-45105 It uses Log4j 2160 Running the application Run it: Import the project in Java IDE as a maven project Run CVEMainApplicationjava as a spring boot app

Log4j2 DOS (CVE-2021-45105) Poc ${${::-${::-$${::-$}}}} Versions Affected: all versions from 20-beta9 to 2160 This application is based on Spring Boot web application vulnerable to CVE-2021-45105 It uses Log4j 2160 Running the application Run it: Import the project in Java IDE as a maven project Run CVEMainApplicationjava as a spr

Recent Articles

Log4j Vulnerabilities: Attack Insights
Symantec Threat Intelligence Blog • Siddhesh Chandrayan • 23 Dec 2024

Symantec data shows variation and scope of attacks.

Posted: 23 Dec, 20214 Min ReadThreat Intelligence SubscribeFollowtwitterlinkedinLog4j Vulnerabilities: Attack InsightsSymantec data shows variation and scope of attacks.Apache Log4j is a Java-based logging utility. The library’s main role is to log information related to security and performance to make error debugging easier and to enable applications to run smoothly. The library is part of the Apache Logging Services, a project of the A...

Budworm: Espionage Group Returns to Targeting U.S. Organizations
Symantec Threat Intelligence Blog • 13 Oct 2024

Posted: 13 Oct, 20225 Min ReadThreat Intelligence SubscribeFollowtwitterlinkedinBudworm: Espionage Group Returns to Targeting U.S. OrganizationsRecent attacks by group have spanned continents and include first confirmed attacks seen against the U.S. in a number of years.The Budworm espionage group has mounted attacks over the past six months against a number of strategically significant targets, including the government of a Middle Eastern country, a mul...

IT threat evolution in Q3 2022. Non-mobile statistics
Securelist • AMR • 18 Nov 2022

IT threat evolution in Q3 2022 IT threat evolution in Q3 2022. Non-mobile statistics IT threat evolution in Q3 2022. Mobile statistics These statistics are based on detection verdicts of Kaspersky products and services received from users who consented to providing statistical data. Quarterly figures According to Kaspersky Security Network, in Q3 2022: Kaspersky solutions blocked 956,074,958 attacks from online resources across the globe. Web Anti-Virus recognized 251,288,987...

Four million outdated Log4j downloads were served from Apache Maven Central alone despite vuln publicity blitz
The Register • Gareth Corfield • 11 Jan 2022

Get our weekly newsletter It's not as though folks haven't been warned about this

There have been millions of downloads of outdated, vulnerable Log4j versions despite the emergence of a serious security hole in December 2021, according to figures compiled by the firm that runs Apache Maven's Central Repository. That company, Sonatype, said it had seen four million downloads of exploitable Log4j versions from the repository alone between 10 December and the present day, out of a total of more than 10 million downloads over those past four weeks. Tracked as CVE-2021-44228 aka L...

Bad things come in threes: Apache reveals another Log4J bug
The Register • Simon Sharwood, APAC Editor • 19 Dec 2021

Get our weekly newsletter Third major fix in ten days is an infinite recursion flaw rated 7.5/10

The Apache Software Foundation (ASF) has revealed a third bug in its Log4 Java-based open-source logging library Log4j. CVE-2021-45105 is a 7.5/10-rated infinite recursion bug that was present in Log4j2 versions 2.0-alpha1 through 2.16.0. The fix is version 2.17.0 of Log4j. That’s the third new version of the tool in the last ten days. In case you haven’t been paying attention, version 2.15.0 was created to fix CVE-2021-44228, the critical-rated and trivial-to-exploit remote code execution f...