4ra1n created LOG4J2-3371:
-----------------------------

             Summary: Log Injection Vulnerability exists in Log4j2 default 
configuration
                 Key: LOG4J2-3371
                 URL: https://issues.apache.org/jira/browse/LOG4J2-3371
             Project: Log4j 2
          Issue Type: Bug
          Components: Core
    Affects Versions: 2.17.1
            Reporter: 4ra1n


For information about log injection, refer to OWASP:
[https://owasp.org/www-community/attacks/Log_Injection]

 

Some time ago, the spring framework revealed two CVE vulnerabilities related to 
log injection: CVE-2021-22096 and CVE-2021-22060:

[https://tanzu.vmware.com/security/cve-2021-22096]

[https://tanzu.vmware.com/security/cve-2021-22060]

Their fix is to filter the log content, such as not allowing line seprators

 

Some time ago, I found a log injection vulnerability in Apache Shiro. Although 
the vulnerability is effective and can be triggered, they think I should report 
the problem to Apahce Log4j and prevent such log injection vulnerability under 
the default configuration

 

code(under the default configuration)
{code:java}
public static void main(String[] args) {
   Logger logger = LogManager.getLogger(Main.class);
   logger.info("test\n00:00:00.000 [main] ERROR com.text.Class -
xxx\nxxx");
} {code}
 

output(under the default configuration)
{code:java}
09:47:34.190 [main] INFO com.example.Main - test
00:00:00.000 [main] ERROR com.text.Class - xxx
xxx {code}
On the exploitation of vulnerabilities: for example, add some confused logs, 
such as forged IP, forged classes, forged error reports and exceptions, which 
brings trouble to the operation and maintenance personnel and auditors. 
Further, if there is an internal log analysis platform, and the xxx is wrapped 
by the script tag, that is, JavaScript code, the platform reading the log may 
have XSS vulnerabilities.



--
This message was sent by Atlassian Jira
(v8.20.1#820001)

Reply via email to