漏洞信息详情
Apache Log4j 输入验证错误漏洞
漏洞简介
Apache Log4j是美国阿帕奇(Apache)基金会的一款基于Java的开源日志记录工具。
Apache Log4J存在输入验证错误漏洞.Log4j-2中存在JNDI注入漏洞,当程序将用户输入的数据进行日志记录时,即可触发此漏洞,成功利用此漏洞可以在目标服务器上执行任意代码。
漏洞公告
目前厂商已发布升级补丁以修复漏洞,补丁获取链接:
https://logging.apache.org/log4j/2.x/security.html
参考网址
来源:MISC
链接:https://logging.apache.org/log4j/2.x/security.html
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2021/12/10/1
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2021/12/10/2
来源:MISC
链接:https://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20211210-0007/
来源:CISCO
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
来源:MLIST
链接:http://www.openwall.com/lists/oss-security/2021/12/10/3
来源:CONFIRM
链接:https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2021-0032
来源:www.cybersecurity-help.cz
链接:https://www.cybersecurity-help.cz/vdb/SB2021121201
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/165225/Apache-Log4j2-2.14.1-Remote-Code-Execution.html
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.4198
来源:tools.cisco.com
链接:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
来源:access.redhat.com
链接:https://access.redhat.com/security/cve/cve-2021-44228
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Apache-log4j-code-execution-via-JNDI-Remote-Class-Injection-37049
受影响实体
暂无
补丁
- Apache Log4j 输入验证错误漏洞的修复措施<!--2021-12-10-->
还没有评论,来说两句吧...