{"id":6722,"date":"2021-12-21T22:23:39","date_gmt":"2021-12-21T22:23:39","guid":{"rendered":"https:\/\/gridinsoft.com\/blogs\/?p=6722"},"modified":"2024-05-31T00:24:23","modified_gmt":"2024-05-31T00:24:23","slug":"another-vulnerability-found-in-log4j","status":"publish","type":"post","link":"https:\/\/gridinsoft.com\/blogs\/another-vulnerability-found-in-log4j\/","title":{"rendered":"Another vulnerability found in Log4j, this time it is a denial of service"},"content":{"rendered":"<h4>Log4Shell, recently discovered in the popular logging library Log4j, which is part of the Apache Logging Project, continues to get worse, as another vulnerability has been found. This time it is time a \u201cdenial of service\u201d vulnerability.<\/h4>\n<p>The problem <a href=\"\/blogs\/0-day-in-log4j-library\/\">was originally discovered<\/a> while catching bugs on Minecraft servers, but the Log4j library is present in almost all corporate applications and Java servers. For example, it can be found in almost all enterprise products released by the Apache Software Foundation, including Apache Struts, Apache Flink, Apache Druid, Apache Flume, Apache Solr, Apache Kafka, Apache Dubbo. Log4j is also actively used in open-source projects such as Redis, Elasticsearch, Elastic Logstash or Hydra.<\/p>\n<p>I also said that <a href=\"\/blogs\/log4j-vulnerability-threatens-35000-java-packages\/\">Log4j vulnerability threatens 35,000 Java packages<\/a>.<\/p>\n<p>Thus, companies using any of these products are also indirectly vulnerable to attacks on Log4Shell, although they may not even know about it. Information security experts immediately warned that the solutions of such giants as Apple, Amazon, Twitter, Cloudflare, Steam, Tencent, Baidu, DIDI, JD, NetEase, and probably thousands of other companies could be vulnerable to Log4Shell.<\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">The way Log4Shell works is simple: the vulnerability forces Java-based applications and servers that use the Log4j library to log a specific string. When an application or server processes such logs, a string can cause the vulnerable system to load and run a malicious script from the attacker&#8217;s controlled domain. The result will be a complete hijacking of the vulnerable application or server, and the attack can develop further.<span class=\"su-quote-cite\">the experts said.<\/span><\/div><\/div>\n<p>It was previously revealed that the first patch for the original problem <strong>CVE-2021-44228<\/strong> (version 2.15) only introduced a new RCE vulnerability <strong>CVE-2021-45046<\/strong> to Log4j, which received 9 points out of 10 on the CVSS vulnerability rating scale.<\/p>\n<p>Because of this, administrators were strongly advised to use only the current version 2.16 and follow further developments on the <a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html\" rel=\"noopener nofollow\" target=\"_blank\">Log4j update page<\/a>. The fact is that in Log4j version 2.15, two more less dangerous vulnerabilities were found (<strong>CVE-2021-4104<\/strong> and <strong>CVE-2021-42550<\/strong>), which were also eliminated only with the release of version 2.16.<\/p>\n<p>Unfortunately, version 2.16 didn&#8217;t last long either. Last weekend, Log4j version 2.17 was released, as a serious denial of service (DoS) issue was detected in the last release, which received the identifier <strong>CVE-2021-45105<\/strong> (7.5 on the CVSS scale). The bug is related to the fact that Log4j does not always protect against infinite recursion during lookup evaluation.<\/p>\n<p>At the same time, experts urge not to panic and not to rush to abandon the use of Log4j at all.<\/p>\n<div class=\"su-quote su-quote-style-default su-quote-has-cite\"><div class=\"su-quote-inner su-u-clearfix su-u-trim\">It shouldn&#8217;t come as a surprise that additional vulnerabilities are being discovered in Log4j, given the increased focus on the library. Likewise, the discovery of a PrintNightmare vulnerability over the summer resulted in the discovery of many additional individual issues. The discovery of additional vulnerabilities in Log4j should not raise concerns about the security of the library itself. In fact, Log4j is more secure because of the extra attention that researchers are giving to it.<span class=\"su-quote-cite\"><a href=\"https:\/\/www.breachquest.com\/log4j-vulnerability-patches-bugs\/\" target=\"_blank\" rel=\"nofollow noopener\">commented Jake Williams, CTO and co-founder of BreachQuest<\/a><\/span><\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Log4Shell, recently discovered in the popular logging library Log4j, which is part of the Apache Logging Project, continues to get worse, as another vulnerability has been found. This time it is time a \u201cdenial of service\u201d vulnerability. The problem was originally discovered while catching bugs on Minecraft servers, but the Log4j library is present in [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":6723,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_sitemap_exclude":false,"_sitemap_priority":"","_sitemap_frequency":"","footnotes":""},"categories":[15],"tags":[442,450,438,374],"class_list":{"0":"post-6722","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-news","8":"tag-apache","9":"tag-log4j","10":"tag-log4shell","11":"tag-vulnerability"},"featured_image_src":"https:\/\/gridinsoft.com\/blogs\/wp-content\/uploads\/2021\/12\/log4j.jpg","author_info":{"display_name":"Vladimir Krasnogolovy","author_link":"https:\/\/gridinsoft.com\/blogs\/author\/krasnogolovy\/"},"_links":{"self":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/6722","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/comments?post=6722"}],"version-history":[{"count":1,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/6722\/revisions"}],"predecessor-version":[{"id":6724,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/posts\/6722\/revisions\/6724"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media\/6723"}],"wp:attachment":[{"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/media?parent=6722"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/categories?post=6722"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gridinsoft.com\/blogs\/wp-json\/wp\/v2\/tags?post=6722"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}