paint-brush
The CRITICAL Log4j Java Vulnerability: How to Detect and Mitigate Itby@kaiiyer
1,325 reads
1,325 reads

The CRITICAL Log4j Java Vulnerability: How to Detect and Mitigate It

by Kai Iyer2mDecember 14th, 2021
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Any organization using Java applications or hardware running Log4j < 2.15 is likely vulnerable. The vulnerability gets triggered if the logged string contains any untrusted strings in any part of the logged data. If successfully exploited, attackers can perform RCE and compromise the affected server leading to a full takeover of the system. Researchers concluded that this is a Java deserialization failure because Log4J makes network requests through the JNDI to an LDAP server and executes any code that is returned. The error is triggered within log messages with the use of the $ {} syntax.

Company Mentioned

Mention Thumbnail
featured image - The CRITICAL Log4j Java Vulnerability: How to Detect and Mitigate It
Kai Iyer HackerNoon profile picture
Kai Iyer

Kai Iyer

@kaiiyer

Privacy Advocate | Dev | Hacker | Mentor | Speaker | Blogger | SysAdmin | Opensource Contributor

About @kaiiyer
LEARN MORE ABOUT @KAIIYER'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Kai Iyer HackerNoon profile picture
Kai Iyer@kaiiyer
Privacy Advocate | Dev | Hacker | Mentor | Speaker | Blogger | SysAdmin | Opensource Contributor

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite