QID 376187
Date Published: 2021-12-16
QID 376187: Apache Log4j 1.2 Remote Code Execution Vulnerability
Apache Log4j is a Java-based logging utility. It is part of the Apache Logging Services, a project of the Apache Software Foundation.
The JMSAppender in Log4j 1.2 is vulnerable to deserialization of untrusted data when the attacker has write access to the Log4j configuration.
The attacker can provide TopicBindingName and TopicConnectionFactoryBindingName configurations causing JMSAppender to perform JNDI requests that result in remote code execution in a similar fashion to CVE-2021-44228.
Affected versions:
Log4j version 1.2
QID Detection: (Authenticated) - Linux
This detection is based on querying the OS package managers on the target. If the target has a log4j package with a version in 1.2, the target is flagged as potentially vulnerable.
QID Detection: (Authenticated) - Windows
On Windows system, the QID identifies vulnerable instance of log4j via WMI to check log4j included in the running processes via command-line.
Successful exploitation of this vulnerability could lead to remote code execution (RCE) on the target.
Workaround:
Audit your logging configuration to ensure it has no JMSAppender configured. Log4j 1.2 configurations without JMSAppender are not impacted by this vulnerability.
Log4j 1.x does not have Lookups, so the risk is lower. Applications using Log4j 1.x are only vulnerable to this attack when they use JNDI in their configuration.
- CVE-2021-4104 -
logging.apache.org/log4j/2.x/security.html
CVEs related to QID 376187
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| Log4j 1.2 |
|