POC详情: 8fc2c71eae1405c150cbcb9db7edf1bb90a1d69b

来源
关联漏洞
标题: Apache Log4j 代码问题漏洞 (CVE-2021-44228)
描述:Apache Log4j是美国阿帕奇(Apache)基金会的一款基于Java的开源日志记录工具。 Apache Log4J 存在代码问题漏洞,攻击者可设计一个数据请求发送给使用 Apache Log4j工具的服务器,当该请求被打印成日志时就会触发远程代码执行。
介绍
Test this content before applying it to production systems.

# Usage

Download the latest package from releases here: https://github.com/VerveIndustrialProtection/CVE-2021-44228-Log4j/releases and then Import the Fixlets, Analyses, and Computer Group into a site and apply computer subscriptions.

## Detection Methods

There are three detection methods available for each supported Operating System. It's important to understand the differences between these detectors before using them.

That being said, the way you use all detections is exactly the same. You simply action them against your devices using the OS-specific detection Fixlet and then review the results using the universal `Warning-*` Fixlets or the universal analysis for triage information.

All detection methods correctly catalog beta/alpha versions.

| Method                        | Impact        | Runtime | True Positive | True Negative | False Positive | False Negatives |
|-------------------------------|---------------|---------|---------------|---------------|----------------|-----------------|
| Verve Log4j Detector          | Extremely Low | <1s     | Good          | Good          | Very Good      | Poor            |
| Verve Log4j Enhanced Detector | Low           | 1-15s   | Very Good     | Very Good     | Very Good      | Very Good       |
| Verve Log4j Full System Scan  | High          | 5-30m   | Very Good     | Very Good     | Very Poor      | Very Good       |

### Verve Log4j Detector

The Verve Log4j Detector is an Ultra-fast low-impact detection mechanism. It does a simple search for Java processes that have loaded log4j JARs. It does not search within our JARs/WARs/etc and thus is likely to produce false negatives. 

It also cannot tell the difference between a JAR that has had its jndi class removed (a potential mitigation).

Use this to get a good sense of what you need to start work on immediately, it produces very few false positives and lets you get working immediately.

These Fixlets have minimal prerequisites. The Windows one downloads a sysinternals tool called `Handle` to do the heavy lifting.

The Fixlets for this method are:

* `Invoke - Verve Log4j Detector - Linux`
* `Invoke - Verve Log4j Detector - Windows`

### Verve Log4j Enhanced Detector

The Verve Log4j Enhanced Detector extends the Ultra-fast low-impact detection mechanism previous described by using it to identify processes on the system that have loaded JARs/WARs/etc. It then provides them to a disection tool which looks into the JAR/WAR/etc and sees if it can locate any embedded Log4j libraries.
This method can detect JARs with their JNDI class removed and will not report them as vulnerable as a result.

This method has a higher impact on the system, directly proportional to the number of open JAR/WAR/etc on the system. That being said, this method is always a lower impact than using a file system scanner.
These Fixlets have some prerequisites. Both Fixlets require a Java Runtime and so a portable JRE 8 runtime is downloaded as part of the action, used to run the detection, and then is discarded.

The Fixlets for this method are:

* `Invoke - Verve Log4j Enhanced Detector - Linux`
* `Invoke - Verve Log4j Enhanced Detector - Windows`

### Verve Log4j Full System Scan

The Verve Log4j Full System Scan relies on Logpresso and is a high-impact detection mechanism. It looks inside of JARs/WARs/etc to identify Log4j libraries.

Unlike the other methods, this finds Log4j files that are on disk but not in use.

Examples include:
* Programs not currently running
* Installers in Downloads Folder
* Old applications on secondary Hard Disks
* Misc folders unrelated to the intended usage of the system

This method produces a lot of data with a lot of false positives. Data from this method requires an operator to analyze it before it's useful for remediation.

We recommended using the other methods when possible.


The Fixlets for this method are:

* `Invoke - Verve Log4j Full System Scan - Linux`
* `Invoke - Verve Log4j Full System Scan - Windows`

## Reviewing Results

To review the results of the detection Fixlets you can view the Analysis called: `Verve Log4j Detector - Results - Universal`

In addition, once the Fixlets have finished the following additional Fixlets become relevant on vulnerable machines:

* `Warning - Verve Log4j Detector reports CVE-2021-44228 - Universal`
* `Warning - Verve Log4j Detector reports CVE-2021-45046 - Universal`
* `Warning - Verve Log4j Detector reports CVE-2021-45105 - Universal`

## Cleanup

A Fixlet called `Invoke - Clear all Verve Log4j Detector results - Universal` is available which wipes any scan results from the system.

## Troubleshooting

If you have any issues please file an issue on the repository and include the results for that computer from the `Verve Log4j Detector - Debug - Universal` analysis.

# License

This content is produced, maintained and copyrighted by Verve Industrial Protection. You may use and distribute this content freely but you may not remove this notice. If you modify this content or derive other content from this content you must make the modified content available for free under these same terms. This content carries no Express or Implied Warranty. THE LICENSED PROPERTY IS PROVIDED "AS IS", WITH ALL FAULTS. THERE ARE NO WARRANTIES OR GUARANTEES, EXPRESS OR IMPLIED, RELATING TO THE VERVE INDUSTRIAL PROTECTION IP, THE PROPRIETARY KNOWLEDGE, OR OTHER SERVICES OR PRODUCTS TO BE PROVIDED HEREUNDER, OR ANY PROSPECTS OR OUTCOME THEREOF. VERVE INDUSTRIAL PROTECTION DISCLAIMS ANY AND ALL, AND INSTRUCTOR ACKNOWLEDGES AND AGREES THAT THERE ARE NO, REPRESENTATIONS, WARRANTIES, COVENANTS, OR CONDITIONS, WHETHER EXPRESS, IMPLIED, ARISING AT LAW, IN EQUITY, OR BY CUSTOM OF TRADE, STATUTORY OR OTHERWISE, ORAL OR WRITTEN, INCLUDING WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, TITLE OR QUIET ENJOYMENT. FURTHER, VERVE INDUSTRIAL PROTECTION DOES NOT WARRANT THAT THE LICENSED PROPERTY IS ERROR-FREE OR WILL BE AVAILABLE AT ALL TIMES OR OPERATE WITHOUT INTERRUPTION. NO ORAL OR WRITTEN INFORMATION OR ADVICE GIVEN BY VERVE INDUSTRIAL PROTECTION, ITS AGENTS, OR ITS EMPLOYEES, AT ANY TIME SHALL CREATE A WARRANTY OF ANY KIND. SOME STATES OR JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF EXPRESS OR IMPLIED WARRANTIES, SO THE ABOVE EXCLUSION MAY NOT APPLY TO YOU. IN THAT EVENT, WARRANTIES SHALL ONLY BE IMPOSED TO THE EXTENT DETERMINED BY A COURT OF COMPETENT JURISDICTION AS REQUIRED BY APPLICABLE LAW.
文件快照

[4.0K] /data/pocs/8fc2c71eae1405c150cbcb9db7edf1bb90a1d69b ├── [4.0K] Detection │   ├── [4.0K] Analyses │   │   ├── [3.6K] Applications - Java - Linux.bes │   │   ├── [3.6K] Applications - Java - Windows.bes │   │   ├── [7.2K] Verve Log4j Detector - Debug - Universal.bes │   │   └── [ 11K] Verve Log4j Detector - Results - Universal.bes │   ├── [4.0K] Computer Groups │   │   └── [ 529] Systems running Java Processes.bes │   └── [4.0K] Fixlets │   ├── [ 11K] Invoke - Apply Verve Log4j Mitigation - Linux.bes │   ├── [ 12K] Invoke - Apply Verve Log4j Mitigation - Windows.bes │   ├── [3.3K] Invoke - Clear all Verve Log4j Detector results - Universal.bes │   ├── [5.9K] Invoke - Log vulnerable Log4j entries to Application Event Log - Windows.bes │   ├── [7.4K] Invoke - Verve Log4j Detector - Linux.bes │   ├── [8.3K] Invoke - Verve Log4j Detector - Windows.bes │   ├── [ 13K] Invoke - Verve Log4j Enhanced Detector - Linux.bes │   ├── [ 14K] Invoke - Verve Log4j Enhanced Detector - Windows.bes │   ├── [ 12K] Invoke - Verve Log4j Full System Scan - Linux.bes │   ├── [ 12K] Invoke - Verve Log4j Full System Scan - Windows.bes │   ├── [4.0K] Warning - Stuck Handle process on system - Windows.bes │   ├── [3.2K] Warning - Verve Log4j Detector reports CVE-2021-44228 - Universal.bes │   ├── [3.3K] Warning - Verve Log4j Detector reports CVE-2021-44832 - Universal.bes │   ├── [3.2K] Warning - Verve Log4j Detector reports CVE-2021-45046 - Universal.bes │   ├── [3.2K] Warning - Verve Log4j Detector reports CVE-2021-45105 - Universal.bes │   └── [2.9K] Warning - Verve Log4j mitigation requires restart - Universal.bes ├── [4.0K] Generator │   ├── [4.0K] Components │   │   ├── [4.0K] Actionscript │   │   │   ├── [ 262] all-convert-result.out-to-logpresso-paths.in.txt │   │   │   ├── [ 164] all-find-java.txt │   │   │   ├── [ 85] all-get-existing-type.txt │   │   │   ├── [ 312] all-mark-completion.txt │   │   │   ├── [ 87] all-mark-start.txt │   │   │   ├── [2.1K] all-normalize-logpresso.txt │   │   │   ├── [ 313] all-prefetch-logpresso.txt │   │   │   ├── [ 593] all-prepare-directories.txt │   │   │   ├── [ 456] all-prepare-logpresso-remediate.txt │   │   │   ├── [1.1K] all-prepare-logpresso-scan.txt │   │   │   ├── [ 442] all-prepare-logpresso-specific-files.txt │   │   │   ├── [ 362] all-validate-logpresso-result.txt │   │   │   ├── [1.2K] all-wait-logpresso-script.txt │   │   │   ├── [ 147] linux-expand-jre.txt │   │   │   ├── [ 454] linux-normalize-filedescriptor.txt │   │   │   ├── [ 618] linux-prefetch-openjre.txt │   │   │   ├── [ 298] linux-prepare-logpresso-input.txt │   │   │   ├── [ 202] linux-query-logpresso-exceptions.txt │   │   │   ├── [1009] linux-wait-filedescriptor.txt │   │   │   ├── [ 127] windows-expand-jre.txt │   │   │   ├── [ 498] windows-normalize-log4j-handle.txt │   │   │   ├── [1.1K] windows-prefetch-handle.txt │   │   │   ├── [ 621] windows-prefetch-openjre.txt │   │   │   ├── [ 236] windows-prefetch-unzip.txt │   │   │   ├── [ 324] windows-prepare-logpresso-input.txt │   │   │   ├── [ 200] windows-query-logpresso-exceptions.txt │   │   │   ├── [ 410] windows-validate-handle-result.txt │   │   │   ├── [ 295] windows-wait-handle-log4j.txt │   │   │   └── [ 790] windows-wait-handle-relevantextensions.txt │   │   ├── [4.0K] Relevance │   │   │   ├── [ 126] all-exists-result.txt │   │   │   ├── [ 163] all-no-recent-scan.txt │   │   │   └── [ 36] windows-xp-plus.txt │   │   └── [4.0K] Text │   │   └── [2.0K] all-copyright.txt │   ├── [3.3K] Generate-Fixlets.ps1 │   ├── [ 164] Publish-Fixlets.ps1 │   ├── [ 331] Readme.md │   └── [4.0K] Templates │   ├── [4.0K] Analyses │   │   ├── [1.6K] Applications - Java - Linux.bes │   │   ├── [1.7K] Applications - Java - Windows.bes │   │   ├── [5.3K] Verve Log4j Detector - Debug - Universal.bes │   │   └── [8.8K] Verve Log4j Detector - Results - Universal.bes │   ├── [4.0K] Computer Groups │   │   └── [ 528] Systems running Java Processes.bes │   └── [4.0K] Fixlets │   ├── [2.1K] Invoke - Apply Verve Log4j Mitigation - Linux.bes │   ├── [2.2K] Invoke - Apply Verve Log4j Mitigation - Windows.bes │   ├── [1.3K] Invoke - Clear all Verve Log4j Detector results - Universal.bes │   ├── [3.8K] Invoke - Log vulnerable Log4j entries to Application Event Log - Windows.bes │   ├── [2.7K] Invoke - Verve Log4j Detector - Linux.bes │   ├── [2.4K] Invoke - Verve Log4j Detector - Windows.bes │   ├── [3.2K] Invoke - Verve Log4j Enhanced Detector - Linux.bes │   ├── [3.0K] Invoke - Verve Log4j Enhanced Detector - Windows.bes │   ├── [2.4K] Invoke - Verve Log4j Full System Scan - Linux.bes │   ├── [2.5K] Invoke - Verve Log4j Full System Scan - Windows.bes │   ├── [2.0K] Warning - Stuck Handle process on system - Windows.bes │   ├── [1.3K] Warning - Verve Log4j Detector reports CVE-2021-44228 - Universal.bes │   ├── [1.3K] Warning - Verve Log4j Detector reports CVE-2021-44832 - Universal.bes │   ├── [1.3K] Warning - Verve Log4j Detector reports CVE-2021-45046 - Universal.bes │   ├── [1.3K] Warning - Verve Log4j Detector reports CVE-2021-45105 - Universal.bes │   └── [ 967] Warning - Verve Log4j mitigation requires restart - Universal.bes └── [6.4K] README.md 13 directories, 79 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。