{"id":13982,"date":"2022-01-07T09:30:00","date_gmt":"2022-01-07T09:30:00","guid":{"rendered":"https:\/\/www.webgains.com\/public\/?p=13982"},"modified":"2022-01-07T10:31:08","modified_gmt":"2022-01-07T10:31:08","slug":"log4j-zero-day-what-it-is-and-why-webgains-is-immune","status":"publish","type":"post","link":"https:\/\/www.webgains.com\/public\/en\/log4j-zero-day-what-it-is-and-why-webgains-is-immune\/","title":{"rendered":"Log4J Zero-Day: What it is and why Webgains is immune"},"content":{"rendered":"\n<p class=\"has-medium-font-size\">On Thursday 9<sup>th<\/sup> December, security researchers found a new zero-day vulnerability in the Apache Log4j Java library. The vulnerability, which enables attackers to gain full control of affected servers, is easy to exploit and is indeed already being exploited in the wild.<\/p>\n\n\n\n<p>Although the vulnerability was first discovered in video game Minecraft, any systems and services that use the Java logging library, Apache Log4j between versions 2.0 and 2.14.1 are affected and at risk. Fortunately, neither the Webgains platform nor tech stack are under threat; our affiliate marketing network doesn\u2019t make use of Log4j and Webgains isn\u2019t built on Java or Java libraries.<\/p>\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<h2 class=\"has-webgainspink-color has-text-color\">Neither the Webgains platform nor tech stack are under threat; our affiliate marketing network doesn\u2019t make use of Log4j and Webgains isn\u2019t built on Java or Java libraries.<\/h2>\n\n\n\n<hr class=\"wp-block-separator is-style-wide\"\/>\n\n\n\n<p><strong>What is a Zero-Day vulnerability?<\/strong><br>A zero-day exploit is an exploit that is unknown by the vendor of software and is used before it is patched.<\/p>\n\n\n\n<p><strong>More about Log4j<\/strong><br>Log4j is an open-source Java-based logging tool available from Apache, used to log error messages in applications. It will interpret a log message as a URL, go and fetch it, and even execute any executable payload it contains with the full privileges of the main program. It\u2019s widely used across many Java applications and infrastructure.<\/p>\n\n\n\n<p>Log4j runs in many libraries including Struts 2, Solr, Druid, Flink and Swift frameworks, and is used in many enterprise-level software applications across the world including systems used by Azure, Dell and Amazon to name a few. The sheer volume of devices at risk combined with the ease with which they can be exploited, means that this vulnerability must be taken extremely seriously in both public and private sectors.<\/p>\n\n\n\n<p>Please refer to Juniper Threat Labs diagram below to understand this Log4j vulnerability, tracked as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2021-44228<\/a>.<\/p>\n\n\n\n<div class=\"wp-block-image is-style-default\"><figure class=\"aligncenter size-large\"><img width=\"602\" height=\"372\" src=\"https:\/\/www.webgains.com\/public\/wp-content\/uploads\/2022\/01\/log4j-diagram.png\" alt=\"\" class=\"wp-image-13983\" srcset=\"https:\/\/www.webgains.com\/public\/wp-content\/uploads\/2022\/01\/log4j-diagram.png 602w, https:\/\/www.webgains.com\/public\/wp-content\/uploads\/2022\/01\/log4j-diagram-300x185.png 300w\" sizes=\"(max-width: 602px) 100vw, 602px\" \/><\/figure><\/div>\n\n\n\n<div style=\"height:44px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>What happens now?<\/strong><br>The central advice coming from US federal body CISA at this moment is to identify internet-facing devices running Log4j and upgrade them to version 2.15.0, or to apply the mitigations provided by vendors &#8220;immediately&#8221;. But it also recommends setting up alerts for probes or attacks on devices running Log4j. \u00a0<br><br>Apache has already released a security patch that disables the system that can be exploited, and this update is now being deployed across all companies that maintain and host this software.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>On Thursday 9th December, security researchers found a new zero-day vulnerability in the Apache Log4j Java library. The vulnerability, which enables attackers to gain full control of affected servers, is easy to exploit and is indeed already being exploited in the wild. Although the vulnerability was first discovered in video game Minecraft, any systems and [&#8230;]<\/p>\n<p><a class=\"btn btn-secondary understrap-read-more-link\" href=\"https:\/\/www.webgains.com\/public\/en\/log4j-zero-day-what-it-is-and-why-webgains-is-immune\/\">Read More&#8230;<\/a><\/p>\n","protected":false},"author":45,"featured_media":13997,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":""},"categories":[431],"tags":[],"acf":[],"uagb_featured_image_src":{"full":["https:\/\/www.webgains.com\/public\/wp-content\/uploads\/2022\/01\/Untitled-design-57.png",900,500,false],"thumbnail":["https:\/\/www.webgains.com\/public\/wp-content\/uploads\/2022\/01\/Untitled-design-57-150x150.png",150,150,true],"medium":["https:\/\/www.webgains.com\/public\/wp-content\/uploads\/2022\/01\/Untitled-design-57-300x167.png",300,167,true],"medium_large":["https:\/\/www.webgains.com\/public\/wp-content\/uploads\/2022\/01\/Untitled-design-57-768x427.png",640,356,true],"large":["https:\/\/www.webgains.com\/public\/wp-content\/uploads\/2022\/01\/Untitled-design-57.png",640,356,false],"xl":["https:\/\/www.webgains.com\/public\/wp-content\/uploads\/2022\/01\/Untitled-design-57.png",900,500,false],"xxl":["https:\/\/www.webgains.com\/public\/wp-content\/uploads\/2022\/01\/Untitled-design-57.png",900,500,false],"xxxl":["https:\/\/www.webgains.com\/public\/wp-content\/uploads\/2022\/01\/Untitled-design-57.png",900,500,false],"xxxxl":["https:\/\/www.webgains.com\/public\/wp-content\/uploads\/2022\/01\/Untitled-design-57.png",900,500,false],"xxxxxl":["https:\/\/www.webgains.com\/public\/wp-content\/uploads\/2022\/01\/Untitled-design-57.png",900,500,false],"1536x1536":["https:\/\/www.webgains.com\/public\/wp-content\/uploads\/2022\/01\/Untitled-design-57.png",900,500,false],"2048x2048":["https:\/\/www.webgains.com\/public\/wp-content\/uploads\/2022\/01\/Untitled-design-57.png",900,500,false]},"uagb_author_info":{"display_name":"Rob Atkinson","author_link":"https:\/\/www.webgains.com\/public\/author\/ratkinsonwebgains-com\/"},"uagb_comment_info":0,"uagb_excerpt":"On Thursday 9th December, security researchers found a new zero-day vulnerability in the Apache Log4j Java library. The vulnerability, which enables attackers to gain full control of affected servers, is easy to exploit and is indeed already being exploited in the wild. Although the vulnerability was first discovered in video game Minecraft, any systems and&hellip;","_links":{"self":[{"href":"https:\/\/www.webgains.com\/public\/wp-json\/wp\/v2\/posts\/13982"}],"collection":[{"href":"https:\/\/www.webgains.com\/public\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.webgains.com\/public\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.webgains.com\/public\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.webgains.com\/public\/wp-json\/wp\/v2\/comments?post=13982"}],"version-history":[{"count":0,"href":"https:\/\/www.webgains.com\/public\/wp-json\/wp\/v2\/posts\/13982\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.webgains.com\/public\/wp-json\/wp\/v2\/media\/13997"}],"wp:attachment":[{"href":"https:\/\/www.webgains.com\/public\/wp-json\/wp\/v2\/media?parent=13982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.webgains.com\/public\/wp-json\/wp\/v2\/categories?post=13982"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.webgains.com\/public\/wp-json\/wp\/v2\/tags?post=13982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}