Log4j

Apache Log4j Security Vulnerabilities

About

IPS

45.155.205.233 (hostway[.]ru)
171.25.193 (tor exits) 
185.220.100.242 (tor exit) 
18.27.197.252 (MIT[.]edu)

45.155.205.233
171.25.193.25
171.25.193.77
171.25.193.20
171.25.193.78
185.220.100.242
18.27.197.252
189.234.182.139
185.220.101.39
104.244.79.6

How to Mitigate

Follow this link for updates: https://logging.apache.org/log4j/2.x/security.html

Log4j 1.x mitigation: Log4j 1.x is not impacted by this vulnerability.

Log4j 2.x mitigation: Implement one of the mitigation techniques below.

  • Java 8 (or later) users should upgrade to release 2.16.0.

  • Users requiring Java 7 should upgrade to release 2.12.2 when it becomes available (work in progress, expected to be available soon).

  • Otherwise, remove the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class

Note that only the log4j-core JAR file is impacted by this vulnerability. Applications using only the log4j-api JAR file without the log4j-core JAR file are not impacted by this vulnerability.

Nuclei Template

Last updated

Was this helpful?