HomePentest-Tools.com Logo

Log4j 1.x - Remote Code Execution (CVE-2019-17571)

Severity
CVSSv3 Score
9.8
Exploitable with Sniper
Yes
Vulnerability description

Log4jv 1.x logging library is affected by a Remote Code Execution vulnerability. The root cause of this vulnerability is that SocketServer class is vulnerable to an insecure deserialization of data which can lead to remote code execution when the server is listening to untrusted network traffic for log data. All the versions between 1.2.0 and 1.2.17 are affected.

Exploit capabilities

Sniper can gain unauthenticated Remote Code Execution on the target system and extract multiple artefacts as evidence.

Risk description

The risk exists that a remote unauthenticated attacker can fully compromise the server in order to steal confidential information, install ransomware, or pivot to the internal network.

Recommendation

Upgrade Log4j library to at least version 1.2.18 and apply security patches.

Detectable with
Network Scanner
Vuln date
Dec 2019
Published at
Updated at
Software Type
Logging library
Vendor
Apache
Product
Log4j
Codename
Not available