Apache Log4j Remote Code Execution (Log4Shell)

critical Web App Scanning Plugin ID 113075

Synopsis

Apache Log4j Remote Code Execution (Log4Shell)

Description

Apache Log4j is an open source Java-based logging framework leveraged within numerous Java applications. Apache Log4j versions 2.0-beta9 to 2.15.0 suffer from insufficient protections on message lookup substitutions when dealing with user controlled input. By crafting a malicious string, an attacker could leverage this issue to achieve a remote code execution on the Log4j instance used by the target application.

Solution

Upgrade to version 2.16.0 or later.

See Also

https://logging.apache.org/log4j/2.x/security.html

https://www.lunasec.io/docs/blog/log4j-zero-day-severity-of-cve-2021-45046-increased/

https://www.lunasec.io/docs/blog/log4j-zero-day/

Plugin Details

Severity: Critical

ID: 113075

Type: remote

Published: 12/11/2021

Updated: 3/6/2024

Scan Template: api, basic, full, log4shell, pci, scan

Risk Information

VPR

Risk Factor: Critical

Score: 10.0

CVSS v2

Risk Factor: High

Base Score: 9.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2021-44228

CVSS v3

Risk Factor: Critical

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVSS Score Source: CVE-2021-44228

Vulnerability Information

CPE: cpe:2.3:a:apache:log4j:*:*:*:*:*:*:*:*

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 12/10/2021

Vulnerability Publication Date: 12/9/2021

CISA Known Exploited Vulnerability Due Dates: 12/24/2021, 5/22/2023

Reference Information

CVE: CVE-2021-44228, CVE-2021-45046