![]() |
![]() |
![]() |
||||
Welcome to the GoFuckYourself.com - Adult Webmaster Forum forums. You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today! If you have any problems with the registration process or your account login, please contact us. |
![]() ![]() |
|
Discuss what's fucking going on, and which programs are best and worst. One-time "program" announcements from "established" webmasters are allowed. |
|
Thread Tools |
![]() |
#1 |
#Alberta51
Industry Role:
Join Date: Oct 2014
Location: USA Territory (Alberta)
Posts: 8,085
|
Extremely bad’ vulnerability found in widely used logging system
The Log4Shell exploit gives attackers a simple way to execute code on any vulnerable machine ![]() Security teams at companies large and small are scrambling to patch a previously unknown vulnerability called Log4Shell, which has the potential to let hackers compromise millions of devices across the internet. If exploited, the vulnerability allows remote code execution on vulnerable servers, giving an attacker the ability to import malware that would completely compromise machines. The vulnerability is found in log4j, an open-source logging library used by apps and services across the internet. Logging is a process where applications keep a running list of activities they have performed which can later be reviewed in case of error. Nearly every network security system runs some kind of logging process, which gives popular libraries like log4j an enormous reach. Marcus Hutchins, a prominent security researcher best known for halting the global WannaCry malware attack, noted online that millions of applications would be affected. “Millions of applications use Log4j for logging, and all the attacker needs to do is get the app to log a special string,” Hutchins said in a tweet. The exploit was first seen on sites hosting Minecraft servers, which discovered that attackers could trigger the vulnerability by posting chat messages. A tweet from security analysis company GreyNoise reported that the company has already detected numerous servers searching the internet for machines vulnerable to the exploit. A blog post from application security company LunaSec claimed that gaming platform Steam and Apple’s iCloud had already been found to be vulnerable. Reached for comment, Valve spokesperson Doug Lombardi said engineers immediately reviewed its systems, and because of network security rules concerning untrusted code, they do not believe Steam is at risk of exploitation. Apple did immediately respond to a request for comment. To exploit the vulnerability, an attacker has to cause the application to save a special string of characters in the log. Since applications routinely log a wide range of events — such as messages sent and received by users, or the details of system errors — the vulnerability is unusually easy to exploit and can be triggered in a variety of ways. “This is a very serious vulnerability because of the widespread use of Java and this package log4j,” Cloudflare CTO John Graham-Cumming told The Verge. “There’s a tremendous amount of Java software connected to the internet and in back-end systems. When I look back over the last 10 years, there are only two other exploits I can think of with a similar severity: Heartbleed, which allowed you to get information from servers that should have been secure, and Shellshock, which allowed you to run code on a remote machine.” However, the diversity of applications vulnerable to the exploit, and range of possible delivery mechanisms, mean that firewall protection alone does not eliminate risk. Theoretically, the exploit could even be carried out physically by hiding the attack string in a QR code that was scanned by a package delivery company, making its way into the system without having been sent directly over the internet. An update to the log4j library has already been released to mitigate against the vulnerability, but given the time taken to ensure that all vulnerable machines are updated, Log4Shell remains a pressing threat. https://www.theverge.com/2021/12/10/...ro-day-exploit
__________________
Tube - Cam - Escorts - Top List Menu Tab - Banner - Header Link - Blog Post DM me ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#2 |
cuckdollars.com
Industry Role:
Join Date: Sep 2014
Location: The aisle where your Depends diapers are sold
Posts: 788
|
lol fake news from the lib media, just like the vaccine or sumethin....
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#3 |
Confirmed User
Industry Role:
Join Date: Oct 2013
Location: Between the legs
Posts: 991
|
cPanel is one of the softwares that uses this library...
|
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#4 |
Too lazy to set a custom title
Industry Role:
Join Date: Dec 2004
Location: Happy in the dark.
Posts: 93,309
|
When is the first vaccine dose for it coming ? ?
__________________
"Tjeezers.cam wishes you a nice day” |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#5 |
(>^_^)b
Industry Role:
Join Date: Dec 2011
Posts: 7,223
|
In this case an injection is bad, tho..
![]()
__________________
![]() I've referred over $1.7mil in spending this past year, you should join in. ![]() ![]() I make a lot more money in the medical field in a lab now, fuck you guys. Don't ask me to come back, but do join Chaturbate in my sig, it still makes bank without me touching shit for years.. ![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
#6 |
Confirmed User
Industry Role:
Join Date: Aug 2015
Posts: 1,017
|
Is anyone in adult even using log4j?
It's overkill for even a medium sized web app... |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() ![]() |
|||||||
|
|||||||
Bookmarks |
Tags |
security, vulnerability, logging, vulnerable, log4j, applications, found, code, exploit, company, servers, internet, machines, attacker, malware, hutchins, steam, comment, immediately, tweet, process, reviewed, millions, network, attackers |
Thread Tools | |