Apache Log4j Remote Code Execution (Log4Shell)

critical Web Application Scanning Plugin ID 113075

Language:

Synopsis

Apache Log4j Remote Code Execution (Log4Shell)

Description

Apache Log4j is an open source Java-based logging framework leveraged within numerous Java applications. Apache Log4j versions 2.0-beta9 to 2.15.0 suffer from insufficient protections on message lookup substitutions when dealing with user controlled input. By crafting a malicious string, an attacker could leverage this issue to achieve a remote code execution on the Log4j instance used by the target application.

Solution

Upgrade to version 2.16.0 or later.

See Also

https://logging.apache.org/log4j/2.x/security.html

https://www.lunasec.io/docs/blog/log4j-zero-day/

https://www.lunasec.io/docs/blog/log4j-zero-day-severity-of-cve-2021-45046-increased/

Plugin Details

Severity: Critical

ID: 113075

Type: remote

Published: 12/11/2021

Updated: 12/27/2021

Scan Template: pci, api, scan, log4shell

Risk Information

VPR

Risk Factor: Critical

Score: 10

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2021-44228

CVSS v3

Risk Factor: Critical

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS Score Source: CVE-2021-44228

Vulnerability Information

CPE: cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/10/2021

Vulnerability Publication Date: 12/9/2021

Reference Information

CVE: CVE-2021-44228, CVE-2021-45046