- 重要な情報
- アプリ内
- インフラストラクチャー
- アプリケーションパフォーマンス
- 継続的インテグレーション
- ログ管理
- セキュリティ
- UX モニタリング
- 管理
Classification:
attack
Detect successful exploits of the Log4shell vulnerability (CVE-2021-44228).
The vulnerability has CVSS Score: 10.0 CRITICAL and can lead to Remote Code Execution (RCE).
Monitor payloads matching known patterns for CVE-2021-44228 (event rule: #sqr-000-017 ) and lookup for HTTP requests to load a Java class.
Generate an Application Security signal with CRITICAL
severity.
Consider blocking the attacking IP(s) temporarily to prevent them to reach deeper parts of your production systems.
Considering the targeted application uses a vulnerable version of log4j and the default settings are disabled:
formatMsgNoLookups=true
. Only available from log4j >= 2.10 versionsorg.apache.logging.log4j.core.lookup.JndiLookup