On 12/12/2021 1:20 pm, David Crayford wrote:
Fingers crossed! The truth is almost no mainframe network (worth its salt) is visible to outside world. But that doesn't stop the public servers being compromised.

A quick fix if you are unable to update to the patched version is to use the following Java property:

‐Dlog4j2.formatMsgNoLookups=True

It seems slightly unfair to call this a Java vulnerability. It's a vulnerability in a package written in Java (albeit widely used). If this is a Java vulnerability, how many C/C++ or even assembler vulnerabilities have we seen?

*My understanding* is that the vulnerability can be exploited if you log data that comes from untrusted sources, e.g. user input like URLs, http headers, perhaps even invalid userids from login attempts?? So I think it could be potentially exploited on the mainframe if user input is passed from a front end and logged on the mainframe. The front end wouldn't need to be written in Java - just the component doing the logging. Direct network access and visibility to the outside world is not required. I think outbound access *is* required for the exploit.

Conceptually it seems similar to SQL injection attacks. Among other things, it highlights the danger of working with data from untrusted sources including http requests, login attempts, etc.

--
Andrew Rowley
Black Hill Software

----------------------------------------------------------------------
For IBM-MAIN subscribe / signoff / archive access instructions,
send email to [email protected] with the message: INFO IBM-MAIN

Reply via email to