Security Test: Log4Shell¶
Description¶
Default Severity:
Log4Shell is a serious flaw in a logging tool where an attacker can send specially crafted input that tricks the system into fetching and executing malicious code from a remote source. This happens because the logging library processes dynamic data without proper safeguards, allowing untrusted information to trigger actions like loading rogue code. That means if a developer unknowingly logs user input directly, it might become a backdoor for hackers, exposing systems to full compromise. The danger lies in the ease of execution and the potential for widespread impact if left unpatched, especially in systems that use logs as diagnostic data without filtering.
Reference:
Configuration¶
Identifier:
injection/log4shel
Examples¶
All configuration available:
Compliance and Standards¶
Standard | Value |
---|---|
OWASP API Top 10 | API8:2023 |
PCI DSS | 6.5.10 |
GDPR | Article-32 |
SOC2 | CC6 |
PSD2 | Article-97 |
ISO 27001 | A.14.2 |
NIST | SP800-53 |
FedRAMP | SI-10 |
CWE | 829 |
CVSS Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C |
CVSS Score | 9.8 |