[建議措施:]
此問題已在 Log4J v2.15.0 中修復。Apache 日誌服務團隊提供以下緩解建議:
在以前的版本中,可以通過將系統屬性log4j2.formatMsgNoLookups設置為TRUE或從類路徑中刪除 JndiLookup 類來緩解這種行為如果無法升級,請確保在客戶端和服務器端組件上都將參數Dlog4j2.formatMsgNoLookups設置為TRUE。
目前已有資安設備廠商已釋出相關攻擊特徵,分別有以下列表,建議擁有這些資安設備,將該特徵設定為阻擋,以避免遭外部攻擊者成功入侵
Checkpoint:
Apache Log4j Remote Code Execution (CVE-2021-44228)
Deep Security:
Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228)
Fidelis:
FSS_CVE-2021-44228 – Apache Log4j Inject Request
Firepower:
SERVER-OTHER Apache Log4j logging remote code execution attempt
SERVER-APACHE Apache Log4j2 CVE- 2021-44228 Remote Code Execution Vulnerability
Fortigate:
Apache.Log4j.Error.Log.Remote.Code.Execution
Palo Alto:
Apache Log4j Remote Code Execution Vulnerability
Mcafee:
UDS-HTTP: Apache Log4j2 Remote Code Execution Vulnerability
HTTP: Apache Log4j2 Remote Code Execution Vulnerability (CVE-2021-44228)
TippingPoint:
HTTP: JNDI Injection in HTTP Request
IBM:
HTTP_Log4J_JndiLdap_Exec
DDI:
HTTP_POSSIBLE_USERAGENT_RCE_EXPLOIT_REQUEST
CVE-2021-44228 – OGNL EXPLOIT – HTTP(REQUEST)
POSSIBLE HTTP HEADER OGNL EXPRESSION EXPLOIT – HTTP(REQUEST)
POSSIBLE HTTP BODY OGNL EXPRESSION EXPLOIT – HTTP (REQUEST) – Variant 2
Sophos:
SERVER-OTHER Apache Log4j logging remote code execution attempt
SERVER-APACHE Apache Log4j2 CVE- 2021-44228 Remote Code Execution Vulnerability |