TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

CVE-2021-45046: Apache Log4j2 2.16.0 is out

10 pointsby weehaover 3 years ago

1 comment

teromover 3 years ago
Further details on the most relevant part here: <a href="https:&#x2F;&#x2F;github.com&#x2F;apache&#x2F;logging-log4j2&#x2F;pull&#x2F;608#issuecomment-993469509" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;apache&#x2F;logging-log4j2&#x2F;pull&#x2F;608#issuecomme...</a><p>Applications using log4j pattern layouts including `${ctx:...}` lookups with versions &lt; 2.15 will remain vulnerable to RCE&#x2F;DNS infoleaks regardless of the `-Dlog4j2.formatMsgNoLookups=true` mitigation, if the attacker can control any of the `org.apache.logging.log4j.ThreadContext` values used in the configured context lookups. Do not rely on the `-Dlog4j2.formatMsgNoLookups=true` mitigation unless you are certain that the application is not using any attacker-controlled context lookups in the log4j pattern layouts.<p>The `zip -q -d log4j-core-*.jar org&#x2F;apache&#x2F;logging&#x2F;log4j&#x2F;core&#x2F;lookup&#x2F;JndiLookup.class` mitigation remains effective for &lt; 2.15.0, and may be a good idea for 2.15.0 as well, to avoid the localhost LDAP connections.