Bitcoin Forum
December 14, 2024, 11:02:13 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: {warning} Log4Shell: RCE 0-day exploit found in log4j2,this is gonna be HUUUUGE  (Read 197 times)
TheBeardedBaby (OP)
Legendary
*
Offline Offline

Activity: 2254
Merit: 3150


₿uy / $ell ..oeleo ;(


View Profile
December 10, 2021, 05:51:27 PM
Last edit: December 10, 2021, 08:09:53 PM by TheBeardedBaby
Merited by NeuroticFish (7), vapourminer (3), ABCbits (1), TryNinja (1), khaled0111 (1), bL4nkcode (1), RickDeckard (1)
 #1

Tl;dr
Quote
It means that any website or server on the Internet that uses a popular Java logging software called log4j can be instantly hacked
Source: https://twitter.com/musalbas/status/1469366000479092752

Quote
A few hours ago, a 0-day exploit in the popular Java logging library log4j2 was discovered that results in Remote Code Execution (RCE) by logging a certain string.

Given how ubiquitous this library is, the impact of the exploit (full server control), and how easy it is to exploit, the impact of this vulnerability is quite severe. We're calling it "Log4Shell" for short (CVE-2021-44228 just isn't as memorable).

The 0-day was tweeted along with a POC posted on GitHub.

Quote
Who is impacted?​
Many, many services are vulnerable to this exploit. Cloud services like Steam, Apple iCloud, and apps like Minecraft have already been found to be vulnerable.

Anybody using Apache Struts is likely vulnerable. We've seen similar vulnerabilities exploited before in breaches like the 2017 Equifax data breach.

Many Open Source projects like the Minecraft server, Paper, have already begun patching their usage of log4j2.

Updates (3 hours after posting): According to this blog post (in english), JDK versions greater than 6u211, 7u201, 8u191, and 11.0.1 are not affected by the LDAP attack vector. In these versions com.sun.jndi.ldap.object.trustURLCodebase is set to false meaning JNDI cannot load a remote codebase using LDAP.

However, there are other attack vectors targeting this vulnerability which can result in RCE. Depending on what code is present on the server, an attacker could leverage this existing code to execute a payload. An attack targeting the class org.apache.naming.factory.BeanFactory, present on Apache Tomcat servers, is discussed in this blog post.

Affected Apache log4j2 Versions​
2.0 <= Apache log4j <= 2.14.1

Permanent Mitigation​
At the time this post was created (December 9th, 2021), no stable release was available.

As of December 10th, 2021, Version 2.15.0 was released. log4j-core.jar is available on Maven Central here, with [release notes] and [log4j security announcements].

Releases to GitHub appear to still be pending.

Source: https://www.lunasec.io/docs/blog/log4j-zero-day/

More info and links to come, but this is really huge...

Quote
This log4j exploit = remote code execution in basically everything

Arbitrary code execution in iCloud, Twitter, Steam, CloudFlare, Amazon, Tesla, Baidu, Tencent

This may well be devastating 0day RCE exploit that has ever been dropped in all of history.

https://t.co/CeQNtSBpZV https://t.co/jYkmdVfdyK

Source: https://twitter.com/musalbas/status/1469297973704245260?t=0MaBwf99XwEwliVn8yvavg&s=19

Pmalek
Legendary
*
Offline Offline

Activity: 2982
Merit: 7642


Playgram - The Telegram Casino


View Profile
December 11, 2021, 10:47:05 AM
 #2

All those JDK versions that were mentioned in the quotes (those older than 6u211, 7u201, 8u191, and 11.0.1) are from 2018, so they are quite outdated. I think the latest versions are 17.something. How big of an impact can this discovered vulnerability have on open-source bitcoin projects? Bitcoinj uses Java for example.   

▄▄███████▄▄███████
▄███████████████▄▄▄▄▄
▄████████████████████▀░
▄█████████████████████▄░
▄█████████▀▀████████████▄
██████████████▀▀█████████
████████████████████████
██████████████▄▄█████████
▀█████████▄▄████████████▀
▀█████████████████████▀░
▀████████████████████▄░
▀███████████████▀▀▀▀▀
▀▀███████▀▀███████

▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
 
Playgram.io
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀

▄▄▄░░
▀▄







▄▀
▀▀▀░░
▄▄▄███████▄▄▄
▄▄███████████████▄▄
▄███████████████████▄
▄██████████████▀▀█████▄
▄██████████▀▀█████▐████▄
██████▀▀████▄▄▀▀█████████
████▄▄███▄██▀█████▐██████
█████████▀██████████████
▀███████▌▐██████▐██████▀
▀███████▄▄███▄████████▀
▀███████████████████▀
▀▀███████████████▀▀
▀▀▀███████▀▀▀
██████▄▄███████▄▄████████
███▄███████████████▄░░▀█▀
███████████░█████████░░
░█████▀██▄▄░▄▄██▀█████░
█████▄░▄███▄███▄░▄█████
███████████████████████
███████████████████████
██░▄▄▄░██░▄▄▄░██░▄▄▄░██
██░░░░██░░░░██░░░░████
██░░░░██░░░░██░░░░████
██▄▄▄▄▄██▄▄▄▄▄██▄▄▄▄▄████
███████████████████████
███████████████████████
 
PLAY NOW

on Telegram
[/
Lucius
Legendary
*
Offline Offline

Activity: 3458
Merit: 6236


Crypto Swap Exchange🈺


View Profile WWW
December 11, 2021, 03:40:01 PM
 #3

I saw this news this morning and it seemed like a really dangerous threat, some say one of the biggest in recent years. What drew my attention was that Cloudflare was also mentioned as a service that is susceptible to attack, and we know that our forum uses it. Yet later they came forward and confirmed that their systems were not vulnerable.

Update December 10, 11:46 AM EST: Cloudflare told BleepingComputer that its systems are not vulnerable to CVE-2021-44228 exploitation attempts.
"We responded quickly to evaluate all potential areas of risk and updated our software to prevent attacks, and have not been able to replicate any external claims that we might be at risk," said Leigh Ann Acosta, Cloudflare's Director of Public Relation

What about the possible vulnerability of the server/s used by the forum, maybe @theymos can say something more?

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
hatshepsut93
Legendary
*
Offline Offline

Activity: 3038
Merit: 2162


View Profile
December 12, 2021, 11:34:58 PM
 #4

But what can we as regular users do? This attack does not target us, it targets servers. So it's important to not leave your personal info everywhere, which is easier said than done, as sites like Amazon or Ebay require it for deliveries.
RickDeckard
Legendary
*
Offline Offline

Activity: 1176
Merit: 3131



View Profile
December 12, 2021, 11:59:44 PM
Merited by vapourminer (3), NeuroticFish (2), ABCbits (1), TheBeardedBaby (1)
 #5

But what can we as regular users do?
We as end users? Nothing, only those who run the servers are able to solve this vulnerability - which was patched on the latest version 2.15[1] - and we, as end users, simply have to trust that whoever has our data stored - as small as it is - will implement this update as soon as possible.
This attack does not target us, it targets servers. So it's important to not leave your personal info everywhere, which is easier said than done, as sites like Amazon or Ebay require it for deliveries.
While it doesn't attack end users per se, it can be used very easily to obtain, for example, the details of a user in a specific service (take, as an extreme example, your Amazon account data). While CloudFlare posted an informative analysis regarding the vulnerability itself[2]and how it was tackled inside of the company[3]. For those who are not so tech savvy - as myself - I found this explanation[4] over at Reddit quite good:
Quote
Answer: Many, many servers including many internet servers use a programming language called Java. Java has been around for a quarter of a century at this point, which in computer technology time, is a very long time indeed. In other words there's lots and lots of servers out there that use Java.

Something that almost every server must do is, over time, generate logs of text. For example "At 12:23pm user 67456 submitted a review for product 7635824: This is the best toothbrush I've ever purchased!".

One of the oldest Java plugins (called libraries) for logging things in a server is called Log4J which has been around for 20 years now. In other words there's lots and lots of servers out there that use Log4J.

It turns out that some versions of Log4J have a critical vulnerability where if a specially formatted piece of text is saved to a log that is handled by Log4J, an arbitrary command can be executed in that server. So for example, "At 12:23pm user 67456 submitted a review for product 7635824: {send user 82738's private account details to badguy267@evil.scammers.com}"

These examples are simplified a lot, but they hopefully communicate the basic nature of the threat.

Unfortunately, as an individual, there's not a lot that you can do about any of this. First off, it's difficult to know which of the internet services that you use depend on Java. Secondly, it is virtually impossible to know which of these services use Log4J. Thirdly, it is even more impossible to know which versions of Log4J they are using.

[1]https://logging.apache.org/log4j/2.x/download.html
[2]https://blog.cloudflare.com/inside-the-log4j2-vulnerability-cve-2021-44228/
[3]https://blog.cloudflare.com/how-cloudflare-security-responded-to-log4j2-vulnerability/
[4]https://libreddit.spike.codes/r/OutOfTheLoop/comments/rdtoqo/whats_going_on_with_an_internet_exploit_called/ho3hofk/ -> From here on now, I'll always be using libreddit when pointing out links for Reddit. For more information about it, you can check out this post by the developer (Essentially it's a private front-end for Reddit.)

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
bct_ail
Legendary
*
Offline Offline

Activity: 2688
Merit: 2229

https://t1p.de/6ghrf


View Profile WWW
December 15, 2021, 08:38:56 PM
Last edit: December 15, 2021, 09:49:53 PM by bct_ail
 #6

cmc was affected by the way.

What is the risk for a user of a node server? Is there a risk for me if I use electrum for example and connect it to an external node server?

edit: keyserver pgp?
RickDeckard
Legendary
*
Offline Offline

Activity: 1176
Merit: 3131



View Profile
December 16, 2021, 07:51:52 PM
Merited by TheBeardedBaby (1)
 #7

A bit late for this problem, but this situation reminded me of this[1] xkcd comic:


Interestingly, I came across this[2] article - posted on 14th November - that states that the measures that were implemented in version 2.15 do not completely address the exploit in certain environments. According to the article:

Quote
It was discovered that version 2.15.0 would still be vulnerable when the configuration has a pattern layout containing a Context Lookup (for example, $${ctx:loginId}), or a Thread Context Map pattern %X, %mdc, or %MDC. In these cases, when the attacker manages to control the Thread Context values, JNDI lookup injections may be possible, resulting in JNDI connections. Version 2.15.0 limited JNDI connections to 'localhost’' but this possibility could result in a denial of service (DoS) or worse.
A fix for these issues came in version 2.16:
Quote
Therefore, a new version (2.16.0) has been made available to completely fix the issue (so far at least) associated with CVE-2021–45046 along with more effective mitigation measures for versions to 2.x versions:
  • Java 8 (or later) users should upgrade to release 2.16.0.
  • Users requiring Java 7 should upgrade to release 2.12.2 when it becomes available (work in progress, expected to be available soon).
  • Otherwise, remove the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
Who knows if the patched issues will stop here or continue to be reported is still unknown ... At least the community is focused on the problem so that's a huge benefit already.

[1]https://www.explainxkcd.com/wiki/index.php/2347:_Dependency
[2]https://isc.sans.edu/diary/Log4j+2.15.0+and+previously+suggested+mitigations+may+not+be+enough/28134

█▀▀▀











█▄▄▄
▀▀▀▀▀▀▀▀▀▀▀
e
▄▄▄▄▄▄▄▄▄▄▄
█████████████
████████████▄███
██▐███████▄█████▀
█████████▄████▀
███▐████▄███▀
████▐██████▀
█████▀█████
███████████▄
████████████▄
██▄█████▀█████▄
▄█████████▀█████▀
███████████▀██▀
████▀█████████
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
c.h.
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀█











▄▄▄█
▄██████▄▄▄
█████████████▄▄
███████████████
███████████████
███████████████
███████████████
███░░█████████
███▌▐█████████
█████████████
███████████▀
██████████▀
████████▀
▀██▀▀
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!