PT-2021-5169 · Apache +8 · Apache Log4J2 +11
Chen Zhaojun
·
Published
2021-12-10
·
Updated
2025-10-16
·
CVE-2021-44228
CVSS v3.1
10
10
Critical
Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Apache Log4j2 versions 2.0-beta9 through 2.15.0
Apache Log4j2 version 2.16.0 and later are not affected, as the vulnerable functionality has been completely removed.
Description
The vulnerability in Apache Log4j2 is related to the JNDI features used in configuration, log messages, and parameters, which do not protect against attacker-controlled LDAP and other JNDI-related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. This issue affects log4j-core and does not affect log4net, log4cxx, or other Apache Logging Services projects. The vulnerability has been exploited in the wild, with reports of attacks on various systems, including those using VMware Horizon. The estimated number of potentially affected devices worldwide is not specified, but it is known that the vulnerability affects a large number of applications and services on the Internet.
Recommendations
For Apache Log4j2 versions 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0, update to version 2.16.0 or later, where the vulnerable functionality has been completely removed.
For versions prior to 2.15.0, set the system property "log4j2.formatMsgNoLookups" to "true" or remove the JndiLookup class from the classpath to mitigate the issue.
Consider disabling the JNDI features or restricting access to the vulnerable module to minimize the risk of exploitation.
As a temporary workaround, consider setting the "log4j2.formatMsgNoLookups" property to "true" to prevent message lookup substitution.
Exploit
Fix
RCE
Resource Exhaustion
Deserialization of Untrusted Data
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
APACHELOG4J2_CVE2021_44228
BDU:2021-05969
CVE-2021-44228
DLA-2842-1
DSA-5020-1
DSA-5022-1
GHSA-7RJR-3Q55-VV33
GHSA-FP5R-V3W9-4333
GHSA-JFH8-C2JP-5V3Q
GHSA-MF4F-J588-5XM8
MGASA-2021-0556
OESA-2021-1462
OESA-2021-1474
OESA-2022-1943
OPENSUSE-SU-2021:1577-1
OPENSUSE-SU-2021:1586-1
OPENSUSE-SU-2021:1601-1
OPENSUSE-SU-2021:1613-1
OPENSUSE-SU-2021:3999-1
OPENSUSE-SU-2021:4094-1
OPENSUSE-SU-2021:4107-1
OPENSUSE-SU-2021:4109-1
OPENSUSE-SU-2021_1577-1
OPENSUSE-SU-2021_1586-1
OPENSUSE-SU-2021_1601-1
OPENSUSE-SU-2021_1613-1
OPENSUSE-SU-2021_3999-1
OPENSUSE-SU-2021_4094-1
OPENSUSE-SU-2021_4107-1
OPENSUSE-SU-2021_4109-1
OPENSUSE-SU-2024:11666-1
OPENSUSE-SU-2024:11683-1
RHSA-2022:1296
RHSA-2022:1297
RHSA-2025:1746
RHSA-2025:1747
SUSE-SU-2021:4096-1
SUSE-SU-2021:4097-1
USN-5192-1
USN-5192-2
USN-5197-1
Affected Products
Apache Log4J 1.2
Apache Log4J2
Apache Struts
Astra Linux
Huawei Vrp
Jmsappender
Linuxmint
Apple Macos
Suse
Symantec Endpoint Protection Server
Ubuntu
Vmware Vcenter
References · 931
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/log4shell_scanner.rb⭐ 36468 🔗 14533 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/log4shell_header_injection.rb⭐ 36468 🔗 14533 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/vmware_vcenter_log4shell.rb⭐ 36468 🔗 14533 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/mobileiron_core_log4shell.rb⭐ 36468 🔗 14533 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/ubiquiti_unifi_log4shell.rb⭐ 36468 🔗 14533 · Exploit
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master//modules/auxiliary/scanner/http/log4shell_scanner.rb⭐ 35561 🔗 14312 · Exploit
- 🔥 https://github.com/fullhunt/log4j-scan⭐ 3432 🔗 742 · Exploit
- 🔥 https://github.com/kozmer/log4j-shell-poc⭐ 1841 🔗 546 · Exploit
- 🔥 https://github.com/christophetd/log4shell-vulnerable-app⭐ 1125 🔗 548 · Exploit
- 🔥 https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words⭐ 954 🔗 138 · Exploit
- 🔥 https://github.com/logpresso/CVE-2021-44228-Scanner⭐ 864 🔗 171 · Exploit
- 🔥 https://github.com/f0ng/log4j2burpscanner⭐ 836 🔗 109 · Exploit
- 🔥 https://github.com/mergebase/log4j-detector⭐ 641 🔗 98 · Exploit
- 🔥 https://github.com/jas502n/Log4j2-CVE-2021-44228⭐ 469 🔗 119 · Exploit
- 🔥 https://github.com/corretto/hotpatch-for-apache-log4j2⭐ 494 🔗 71 · Exploit