Warning: Undefined array key "HTTPS" in /srv/users/leanwi/apps/leanwi-org/public/wp-config.php on line 21

Warning: Cannot modify header information - headers already sent by (output started at /srv/users/leanwi/apps/leanwi-org/public/wp-config.php:21) in /srv/users/leanwi/apps/leanwi-org/public/wp-includes/rest-api/class-wp-rest-server.php on line 1831

Warning: Cannot modify header information - headers already sent by (output started at /srv/users/leanwi/apps/leanwi-org/public/wp-config.php:21) in /srv/users/leanwi/apps/leanwi-org/public/wp-includes/rest-api/class-wp-rest-server.php on line 1831

Warning: Cannot modify header information - headers already sent by (output started at /srv/users/leanwi/apps/leanwi-org/public/wp-config.php:21) in /srv/users/leanwi/apps/leanwi-org/public/wp-includes/rest-api/class-wp-rest-server.php on line 1831

Warning: Cannot modify header information - headers already sent by (output started at /srv/users/leanwi/apps/leanwi-org/public/wp-config.php:21) in /srv/users/leanwi/apps/leanwi-org/public/wp-includes/rest-api/class-wp-rest-server.php on line 1831

Warning: Cannot modify header information - headers already sent by (output started at /srv/users/leanwi/apps/leanwi-org/public/wp-config.php:21) in /srv/users/leanwi/apps/leanwi-org/public/wp-includes/rest-api/class-wp-rest-server.php on line 1831

Warning: Cannot modify header information - headers already sent by (output started at /srv/users/leanwi/apps/leanwi-org/public/wp-config.php:21) in /srv/users/leanwi/apps/leanwi-org/public/wp-includes/rest-api/class-wp-rest-server.php on line 1831

Warning: Cannot modify header information - headers already sent by (output started at /srv/users/leanwi/apps/leanwi-org/public/wp-config.php:21) in /srv/users/leanwi/apps/leanwi-org/public/wp-includes/rest-api/class-wp-rest-server.php on line 1831

Warning: Cannot modify header information - headers already sent by (output started at /srv/users/leanwi/apps/leanwi-org/public/wp-config.php:21) in /srv/users/leanwi/apps/leanwi-org/public/wp-includes/rest-api/class-wp-rest-server.php on line 1831
{"id":336,"date":"2021-12-15T09:19:12","date_gmt":"2021-12-15T15:19:12","guid":{"rendered":"https:\/\/leanwi.org\/?page_id=336"},"modified":"2023-02-13T07:23:59","modified_gmt":"2023-02-13T13:23:59","slug":"log4shell","status":"publish","type":"page","link":"http:\/\/leanwi.org\/log4shell\/","title":{"rendered":"Log4Shell Threat"},"content":{"rendered":"

[et_pb_section fb_built=”1″ _builder_version=”4.6.6″ _module_preset=”default”][et_pb_row column_structure=”3_5,2_5″ _builder_version=”4.6.6″ _module_preset=”default” width=”100%”][et_pb_column type=”3_5″ _builder_version=”4.6.6″ _module_preset=”default”][et_pb_blurb title=”Log4j cve-2021-44228 ( aka %22Log4Shell%22 )” use_icon=”on” font_icon=”%%287%%” _builder_version=”4.6.6″ _module_preset=”default” header_level=”h2″ custom_margin=”|||-317px||” hover_enabled=”0″ sticky_enabled=”0″]<\/p>\n

There’s a lot going on with the Log4j vulnerabiliy … cve-2021-44228<\/a>, referred to as Log4Shell … and a lot of confusion regarding the nature of the risk it presents.\u00a0 It is considerd 10 out of 10 on the CVSS scoring system<\/a>, and is extrodinarily easy to exploit.\u00a0 It is so dangerous because it enables both direct and indirect (secondary, post-exploit and\/or lateral movement) attack vectors.\u00a0 Many are currently focused on vetting and closing off against direct attack – ie. detectable instances of the vulnerability directly embedded in production applications\/network environment – but the potential for secondary effects is likely going to be seen as the more devistating aspect of this vulnerability over time.<\/p>\n

This Laconic post from yesterday<\/a> has a blurb which pretty much covers the simplicity…<\/p>\n

\n

“… anyone can make a Log4Shell exploit, and there\u2019s a large attack surface to play with. A six-year-old can craft one of these ${ jndi:…} strings herself, having read the above text. She can then submit it to a targeted server as part of a username, a password, a phone number, a TCP packet, any sort of input the server processes. If the Java on the victim end logs this input using a vulnerable instance of log4j2, the attack succeeds.”<\/p>\n<\/blockquote>\n

 <\/p>\n

I’ve sketched out a brief example of customer (WVLS in this case) with external service relationships between two vendors (OverDrive and Bywater in this case) to try to illustrate what the indirect secondary or lateral post-exploit effects might look like.\u00a0 These are hypothetical abstracts, and ARE NOT<\/strong> indicitive of any known compromise of particular vendors.<\/p>\n

NOTE: this sketch up has not yet been narrated or captioned for more thorough explanation of the concepts it attempts to reprsent but I intend to update it with narration, or at least some strategic captioning to do just that ASAP.<\/p>\n

Also, please note that at the time this page was published, both Bywater (Aspen Discovery Layer) and Overdrive (Wisconsin Digital Library) have responded to RFIs, indicating that their application service layers at least are not known to be directly vulnerable to cve-2021-44228.<\/p>\n

[\/et_pb_blurb][\/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.6.6″ _module_preset=”default”][et_pb_video src=”https:\/\/leanwi.org\/wp-content\/uploads\/2021\/12\/Idea-Pad_76_quick_not_narrated.mp4″ _builder_version=”4.6.6″ _module_preset=”default”][\/et_pb_video][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

There’s a lot going on with the Log4j vulnerabiliy … cve-2021-44228, referred to as Log4Shell … and a lot of confusion regarding the nature of the risk it presents.\u00a0 It is considerd 10 out of 10 on the CVSS scoring system, and is extrodinarily easy to exploit.\u00a0 It is so dangerous because it enables both direct and indirect (secondary, post-exploit and\/or lateral movement) attack vectors.\u00a0 Many are currently focused on vetting and closing off against direct attack – ie. detectable instances of the vulnerability directly embedded in production applications\/network environment – but the potential for secondary effects is likely going to be seen as the more devistating aspect of this vulnerability over time. This Laconic post from yesterday has a blurb which pretty much covers the simplicity… “… anyone can make a Log4Shell exploit, and there\u2019s a large attack surface to play with. A six-year-old can craft one of these ${ jndi:…} strings herself, having read the above text. She can then submit it to a targeted server as part of a username, a password, a phone number, a TCP packet, any sort of input the server processes. If the Java on the victim end logs this input using a […]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-336","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/leanwi.org\/wp-json\/wp\/v2\/pages\/336"}],"collection":[{"href":"http:\/\/leanwi.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/leanwi.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/leanwi.org\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/leanwi.org\/wp-json\/wp\/v2\/comments?post=336"}],"version-history":[{"count":7,"href":"http:\/\/leanwi.org\/wp-json\/wp\/v2\/pages\/336\/revisions"}],"predecessor-version":[{"id":447,"href":"http:\/\/leanwi.org\/wp-json\/wp\/v2\/pages\/336\/revisions\/447"}],"wp:attachment":[{"href":"http:\/\/leanwi.org\/wp-json\/wp\/v2\/media?parent=336"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}