Aayush Goel posted: " What is Log4j? Log4j is a java package mostly a part of the Apache Logging utility used to capture logs. Everything you do on the internet becomes an event that gets captured in a form of a log. Even your inputs also get captured in logs. So, in th"
Log4j is a java package mostly a part of the Apache Logging utility used to capture logs. Everything you do on the internet becomes an event that gets captured in a form of a log. Even your inputs also get captured in logs.
So, in this case, the malicious input gets captured in the log which then results in the execution of the input resulting in remote code execution. That means the attacker is executing the commands using logs.
Currently, the CVSS score of this vulenrability is 10 which makes it critical in severity. The CVE assigned to this vulnerability is CVE-2021-44228.
If everything goes well you will receive a reverse shell on the Netcat listener
Let us stabilize the shell or try to get a persistent shell using
python -c 'import pty; pty.spawn("/bin/bash")'
and check for permissions
From the following output, we infer that there are no restrictions
So we will try to get the solr user access by changing the password solr user using root privileges
and now we ssh as solr user
That is how one can try to exploit this vulnerability. However, the exploitation is not limited as it may have many attack vectors. So better keep hustling.
Mitigation
Keep updating the service
Block exploits by implementing firewall and egress rules
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.