<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Log4shell: CVSS 10! in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48629#M3379</link>
    <description>&lt;P&gt;Most Burp extensions are written in a similar way as this one. I have no issues with this one except that it is NOT (yet??) in the Burp Extender "BApp store". &lt;A href="https://portswigger.net/bappstore/b011be53649346dd87276bca41ce8e8f" target="_blank" rel="noopener"&gt;Log4Scanner&lt;/A&gt; is in BApp. The same caveat emptor applies to many of the GitHub JNDI scanners out there on GitHub. Always do a code review before using anything! I have seen some "spooky" stuff out there...&lt;/P&gt;</description>
    <pubDate>Tue, 14 Dec 2021 02:15:05 GMT</pubDate>
    <dc:creator>AppDefects</dc:creator>
    <dc:date>2021-12-14T02:15:05Z</dc:date>
    <item>
      <title>Log4shell: CVSS 10!</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48607#M3373</link>
      <description>&lt;P&gt;In case anyone missed all the action today:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://portswigger.net/daily-swig/log4shell-vulnerability-poses-critical-threat-to-applications-using-ubiquitous-java-logging-package-apache-log4j" target="_blank" rel="noopener"&gt;Log4Shell’ vulnerability poses critical threat to applications using ‘ubiquitous’ Java logging package Apache Log4j,&amp;nbsp;&lt;/A&gt;and here&amp;nbsp;&lt;A href="https://www.veracode.com/blog/research/exploiting-jndi-injections-java" target="_blank" rel="noopener"&gt;Exploiting JNDI Injections in Java&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Have a nice weekend...&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 10:02:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48607#M3373</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2023-10-09T10:02:35Z</dc:date>
    </item>
    <item>
      <title>Re: Log4shell: CVSS 10!</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48610#M3374</link>
      <description>&lt;P&gt;It is really hard to miss but the hard part is getting identify and patch them in time.&lt;/P&gt;</description>
      <pubDate>Sun, 12 Dec 2021 17:49:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48610#M3374</guid>
      <dc:creator>csjohnng</dc:creator>
      <dc:date>2021-12-12T17:49:10Z</dc:date>
    </item>
    <item>
      <title>Re: Log4shell: CVSS 10!</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48613#M3375</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There will be a great deal of people sorting out this issue, which is likely to affect many cloud providers as well:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://securityintelligence.com/posts/apache-log4j-zero-day-vulnerability-update/" target="_blank"&gt;https://securityintelligence.com/posts/apache-log4j-zero-day-vulnerability-update/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://exchange.xforce.ibmcloud.com/collection/Log4Shell-Zero-Day-Targeting-Java-Package-4daa3df4f73a51590efced7fb90bc949/reports" target="_blank"&gt;https://exchange.xforce.ibmcloud.com/collection/Log4Shell-Zero-Day-Targeting-Java-Package-4daa3df4f73a51590efced7fb90bc949/reports&lt;/A&gt;&lt;A href="https://exchange.xforce.ibmcloud.com/collection/Log4Shell-Zero-Day-Targeting-Java-Package-4daa3df4f73a51590efced7fb90bc949/reports" target="_blank"&gt;https://exchange.xforce.ibmcloud.com/collection/Log4Shell-Zero-Day-Targeting-Java-Package-4daa3df4f73a51590efced7fb90bc949/reports&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It is definitely keeping a lot of Incident Response personnel occupied.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And there is also a tool to detect too:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://github.com/xforcered/scan4log4shell" target="_blank"&gt;https://github.com/xforcered/scan4log4shell&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 03:18:09 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48613#M3375</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-12-13T03:18:09Z</dc:date>
    </item>
    <item>
      <title>Re: Log4shell: CVSS 10!</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48614#M3376</link>
      <description>&lt;P&gt;Thanks for sharing the information&lt;/P&gt;</description>
      <pubDate>Mon, 13 Dec 2021 09:12:33 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48614#M3376</guid>
      <dc:creator>Richard_Hlalele</dc:creator>
      <dc:date>2021-12-13T09:12:33Z</dc:date>
    </item>
    <item>
      <title>Re: Log4shell: CVSS 10!</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48629#M3379</link>
      <description>&lt;P&gt;Most Burp extensions are written in a similar way as this one. I have no issues with this one except that it is NOT (yet??) in the Burp Extender "BApp store". &lt;A href="https://portswigger.net/bappstore/b011be53649346dd87276bca41ce8e8f" target="_blank" rel="noopener"&gt;Log4Scanner&lt;/A&gt; is in BApp. The same caveat emptor applies to many of the GitHub JNDI scanners out there on GitHub. Always do a code review before using anything! I have seen some "spooky" stuff out there...&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 02:15:05 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48629#M3379</guid>
      <dc:creator>AppDefects</dc:creator>
      <dc:date>2021-12-14T02:15:05Z</dc:date>
    </item>
    <item>
      <title>Re: Log4shell: CVSS 10!</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48631#M3380</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/887781263"&gt;@AppDefects&lt;/a&gt;Absolutely agree, but when people are in a rush, and the pressure is on - all sorts of issues arise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Time for automation and orchestration.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Tue, 14 Dec 2021 02:48:02 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48631#M3380</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-12-14T02:48:02Z</dc:date>
    </item>
    <item>
      <title>Re: Log4shell: CVSS 10!</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48642#M3382</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/887781263"&gt;@AppDefects&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, while we are busy in handling this.&lt;/P&gt;&lt;P&gt;We shall really look close at the code download from the git to avoid people is taking advantage on this rush.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Joke aside, my developer is very happy and told me that look we are lucky that we are not using log4j2 but just logj4 and bring me a dump of the class, that's the benefit of using old version and not doing upgrade. HaHaHa.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;and within 5 minutes, I look there are a lot of other vulnerabilities which they are equally bad.. exist in the dump screen..... I am speechless.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 03:48:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48642#M3382</guid>
      <dc:creator>csjohnng</dc:creator>
      <dc:date>2021-12-15T03:48:35Z</dc:date>
    </item>
    <item>
      <title>Re: Log4shell: CVSS 10!</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48647#M3383</link>
      <description>&lt;P&gt;Hi All&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyone want a good layman's explanation with an example, here is one for those who cannot handle the technology and acryonyms and their heads are spinning.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://au.pcmag.com/security/91448/critical-apache-log4j2-exploit-demonstrated-in-minecraft" target="_blank"&gt;https://au.pcmag.com/security/91448/critical-apache-log4j2-exploit-demonstrated-in-minecraft&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_ cautim&lt;/P&gt;</description>
      <pubDate>Wed, 15 Dec 2021 23:36:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48647#M3383</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-12-15T23:36:50Z</dc:date>
    </item>
    <item>
      <title>Re: Log4shell: CVSS 10!</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48648#M3384</link>
      <description>&lt;P&gt;As these are appearing regularly, this is an exceptional one for explaining to the C-Suite how bad the situation really is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://gizmodo.com/log4j-just-how-screwed-are-we-1848199547" target="_blank"&gt;https://gizmodo.com/log4j-just-how-screwed-are-we-1848199547&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It may help a great deal.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Thu, 16 Dec 2021 00:46:39 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48648#M3384</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-12-16T00:46:39Z</dc:date>
    </item>
    <item>
      <title>Re: Log4shell: CVSS 10!</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48748#M3389</link>
      <description>&lt;P&gt;Just be-aware of the situation where there are changes in the attacks in further vulnerability.&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.cisa.gov/uscert/ncas/alerts/aa21-356a" target="_blank"&gt;https://www.cisa.gov/uscert/ncas/alerts/aa21-356a&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best is to patch them to 2.17.&lt;/P&gt;&lt;P&gt;if you are relying the WAF to temporary block those (which buy you time to upgrade), make sure your signatures are up to date, the signature are keep adding and adding each and almost every 2 days.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 23 Dec 2021 06:53:01 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48748#M3389</guid>
      <dc:creator>csjohnng</dc:creator>
      <dc:date>2021-12-23T06:53:01Z</dc:date>
    </item>
    <item>
      <title>Re: Log4shell: CVSS 10!</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48760#M3391</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1424597851"&gt;@csjohnng&lt;/a&gt;&amp;nbsp;&amp;nbsp; Like everyone else, it appears that Alibaba, didn't disclose it to the Chinese Government first, which apparently they were meant to do before it went public!!&amp;nbsp; We can guess what would have happened, if the Chinese Government had been informed and then decided to use it against everyone else.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Unfortunately the North Korean hacking teams are probably making hay while they can and using for their own nefarious purposes too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best to keep an eye on what is going on, more exploits being created and reported upon even as we liaise.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Lets hope it is a quiet Christmas, but unfortunately, I don't think that will be the case.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And just as predicted Conti and ransomware exploiters are now using it:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.techrepublic.com/article/conti-ransomware-is-exploiting-the-log4shell-vulnerability-to-the-tune-of-millions/" target="_blank"&gt;https://www.techrepublic.com/article/conti-ransomware-is-exploiting-the-log4shell-vulnerability-to-the-tune-of-millions/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Fri, 24 Dec 2021 04:50:35 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Log4shell-CVSS-10/m-p/48760#M3391</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2021-12-24T04:50:35Z</dc:date>
    </item>
  </channel>
</rss>

