Select Page

Dec 13, 2021

Large-scale intrusion caused by Log4j2 vulnerability

by

Introduction

Recently, the details of a remote code execution vulnerability in Apache Log4j2 have been disclosed. Once the vulnerability is exploited by an attacker, it will cause serious harm. The vulnerability has an extremely wide range of impact and can result in serious consequences. We recommend that enterprises initiate an emergency response to repair it immediately.

Apache Log4j2 is an excellent Java log framework. This tool rewrites the Log4j framework and introduces a large number of features. The log framework is commonly incorporated with web service system. The vulnerability leverages the insufficient sanitization of data supplied by user in the domain name or directory lookup service to potentially allow attackers to construct malicious requests to trigger remote code execution vulnerabilities.

Affected Version

2.0 <= Apache Log4j <= 2.15.0-rc1

Defense and Fix Suggestions

Vulnerability exploitation does not require special configuration. The security team has verified that Apache Struts2, Apache Solr, Apache Druid, Apache Flink, etc. are all affected. Because this component is widely used, Apache Log4j2 users are reminded to take security measures as soon as possible to prevent vulnerability attacks.

Based on the current characteristics of the vulnerability, we recommend the following suggestions:

  1. Official fix: https://github.com/apache/logging-log4j2/releases/tag/log4j-2.15.0-rc2
  2. Modify jvm parameter -Dlog4j2.formatMsgNoLookups=true
  3. Modify configuration log4j2.formatMsgNoLookups=True
  4. Set the system environment variable FORMAT_MESSAGES_PATTERN_DISABLE_LOOKUPS to true

Hillstone NGFW, NIPS, sBDS can support the detection of the vulnerability. IPS signature database version: 2.1.434/3.0.86. The corresponding signatures: 334337, 334338, 334364.

Figure 1. Log4j vulnerability detected by Hillstone NGFW, NIPS, sBDS

Hillstone WAF can support the detection of the vulnerability. WAF signature database version: 1.1.130. The corresponding signature: 1070310151.

Figure 2. Log4j vulnerability detected by Hillstone WAF

The hotspot intelligence of this vulnerability is available on Hillstone iSource as well.

Figure 3. Hotspot intelligence on Hillstone iSource