vendor:
Log4j2
by:
leonjza
10
CVSS
CRITICAL
Information Disclosure
200
CWE
Product Name: Log4j2
Affected Version From: <= 2.14.1
Affected Version To:
Patch Exists: YES
Related CWE: CVE-2021-44228
CPE: a:apache:log4j:2.14.1
Metasploit:
https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2022-33915/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-alas-2022-1806/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-alas-2022-1601/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2022-33915/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2021-3100/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2022-0070/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2022-0070/, https://www.rapid7.com/db/vulnerabilities/oracle-weblogic-cve-2021-4104/, https://www.rapid7.com/db/vulnerabilities/vcenter-log4j-core-vmsa-2021-0028-9-mitigated/, https://www.rapid7.com/db/vulnerabilities/vcenter-log4j-CVE-2021-44228/, https://www.rapid7.com/db/vulnerabilities/vmsa-2021-0028-cve-2021-44228/, https://www.rapid7.com/db/vulnerabilities/vmware-vrealize-cve-2021-44228/, https://www.rapid7.com/db/vulnerabilities/vmware-vrealize-cve-2021-45046/, https://www.rapid7.com/db/vulnerabilities/vmsa-2021-0028-cve-2021-45046/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2021-3100/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-alas-2021-1554/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2021-45046/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2021-4104/, https://www.rapid7.com/db/vulnerabilities/red_hat-jboss_eap-cve-2021-4104/, https://www.rapid7.com/db/vulnerabilities/ibm-was-cve-2021-45046/, https://www.rapid7.com/db/?q=CVE-2021-44228&type=&page=2, https://www.rapid7.com/db/?q=CVE-2021-44228&type=&page=3, https://www.rapid7.com/db/?q=CVE-2021-44228&type=&page=2
Platforms Tested: Python
2021
Apache Log4j2 2.14.1 – Information Disclosure
Pure python ENV variable leak PoC for CVE-2021-44228. This PoC sends a request to the target URL with the host and port of the exploit server. The exploit server then sends a LDAP header to the target and extracts the response which contains the environment variables of the target.
Mitigation:
Upgrade to Apache Log4j2 version 2.14.2 or later.