Breaking

Patch the Log4Shell vulnerability now to avoid a data breach

Security researchers from Cybereason has published a ‘Vaccine’ that can be used as a mitigation to the critical Log4Shell vulnerability on Apache Log4j code execution that is currently being exploited in the wild.

Apache Log4j, a java-based logging platform which is used for analyzing web server access or application logs. The Apache  log4j is mostly used in  games  like Minecraft, enterprise eCommerce platforms and other java based applications. However, Minecraft recently released a patch to fix the vulnerability.

A proof of concept exploit for this Log4Shell vulnerability was released by researchers with CVE-2021-44228 tracking. Later Apache quickly released a patch as Log4j 2.15.0 to fix the vulnerability, while there were attacks happening in the wild. This java vulnerability was troublesome for enterprises and popular websites as it could cause nightmares to their normal operations.

Fixing the Log4Shell vulnerability

Researchers from Cybereason had published a script or called it as ‘Vaccine’, that would disable the vulnerability even on remote. The vaccine manipulates the vulnerability by exploiting the vulnerable server. The Logout4Shell vulnerability project will facilitate setting up a Java-based LDAP server and includes a payload that will disable the ‘trustURLcodebase’ to mitigate vulnerability. However, the best option is to patch the log4j version with 2.15.0 update.

While this looks good threat actors could take over a device, patch it and then prevent other hackers from compromising the server. The BrickerBot malware took the vulnerable devices offline, and then gray hats used the Internet-connected printers to mitigate the situation by take those printers offline.

Here’s what Cybereason CTO has to say about their Logout4Shell project,

While always a possibility, it’s an issue of a calculated risk. This vulnerability is so critical and already massively abused across the Internet, we felt compelled to offer something to help defenders across the globe buy precious time against these hackers.

From an impact perspective, it’s very similar to the Apache Struts vulnerability that was used to steal information from Equifax in May-July 2017.”

– Yonatan Striem-Amit, CTO and Co-founder, Cybereason.

You can try this project by visiting the project’s GitHub page.

Subscribe to our newsletter for daily alerts on cyber events, you can also follow us on Facebook, Linkedin, Instagram, Twitter and Reddit.

You can reach out to us via Twitter or Facebook, for any advertising requests.

Share the article with your friends
William Marshal

William has been one of the key contributors to 'The Cybersecurity Times' with 9.5 years of experience in the cybersecurity journalism. Apart from writing, he also like hiking, skating and coding.

Recent Posts

Top 5 Best Project Management Tools for Your Business

Explore efficiency with the Top 5 Best Project Management Software – streamline tasks, boost collaboration,…

2 months ago

Top 5 Best Free Antivirus for Android Smartphones: Stay Protected

Explore the top 5 best free antivirus apps for Android smartphones – your essential defense…

2 months ago

What is India’s Digital Personal Data Protection (DPDP)Act? Understanding Rights, Scope, Responsibilities, and Penalties

Unlocking India's DPDP Act: Your Guide to Rights, Responsibilities, and Top 5 Tools for 2024.…

2 months ago

Top 5 Best Data Loss Prevention Tools for 2024

Uncover insights on advanced features, performance, and user experiences. Discover the top 5 best Data…

3 months ago

Top 5 Windows Server Patching Tools for 2024

Unlock efficient Windows Server patching with insights on top tools and vendors. Streamline your cybersecurity…

3 months ago

Software Deployment: What it is, Best Practices and Top 5 Tools

Software deployment is the process of rolling out an application, which could occur manually or…

4 months ago