Thanks to Detectify Crowdsource hackers, Detectify quickly developed a security test to detect Critical vulnerability CVE-2021-44228 Apache log4j RCE and you can start scanning with Detectify now. This vulnerability has set the internet alight over the past few days. Right now, exploit developers and security researchers are still understanding the potential capabilities provided by the vulnerability. Detectify received a working POC for this critical 0-day vulnerability from the Crowdsource community on Friday.
Impact
In short, the CVE-2021-44228 Apache log4j RCE vulnerability allows an attacker, who can control log messages or log message parameters, to execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.
Here are some of the software identified as potentially vulnerable:
- solr
- druid
- flink
- struts2
- logstash
- redis
- elasticsearch
- kafka
- pulsesecure
- spark
- tomcat
Information from Apache.org:
CVE-2021-44228: Apache Log4j2 JNDI features do not protect against attacker controlled LDAP and other JNDI related endpoints.
Severity: Critical
Base CVSS Score: 10.0 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Versions Affected: all
log4j-core
versions >=2.0-beta9 and <=2.14.1
Affected customers will be alerted
On Friday morning, Detectify received the proof-of-concept (POC) for CVE-2021-44228 Apache log4j RCE from the Crowdsource community, allowing us to deploy a test for the vulnerability in production within hours of validating the POC. Customers already running Detectify Application Scanning will be checked for this vulnerability and alerted if it is detected in your assets. Note: you will need to have Detectify IPs on your allow-list for the tests to be successful.
This is yet another example as to why crowdsourcing security research is becoming a need and not just a nice-to-have. Solely relying on internal security research teams and testing against CVE libraries is a thing of the past. Crowdsourcing vulnerabilities is the quickest way to get vulnerability research from the streets to your hands to verify if applications are exploitable.
What if I am using log4j?
The entire security community seems to be tracking this closely including this blueteamsec thread on reddit. Here are the recommendations directly from Apache:
In releases >=2.10, this behavior can be mitigated by setting either the system property
log4j2.formatMsgNoLookups
or the environment variableLOG4J_FORMAT_MSG_NO_LOOKUPS
totrue
.For releases >=2.7 and <=2.14.1, all
PatternLayout
patterns can be modified to specify the message converter as%m{nolookups}
instead of just%m
. For releases >=2.0-beta9 and <=2.10.0, the mitigation is to remove theJndiLookup
class from the classpath:zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
.
Further reading:
If you’re a Detectify customer, we highly recommend scanning all critical assets as soon as you can. All users have access to log4j vulnerability scanning now.
If you’re not already a customer, click here to sign up for a free trial and immediately start scanning. Go hack yourself!