Skip to content

Injection: Apache Log4j2 Remote Code Injection

Identifier: cve_2021_44228

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner ASM Scanner

Description

Apache Log4j2 \<=2.14.1 JNDI features do not protect against attacker-controlled LDAP and other JNDI endpoints, allowing attackers who can control log messages or parameters to execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

How we test: We test for Log4j remote code execution vulnerabilities by injecting JNDI lookup payloads into log messages and parameters, then analyzing responses to detect if remote code execution is possible.

Reference:

Configuration

Example

Example configuration:

---
security_tests:
  cve_2021_44228:
    skip: false

Reference

skip

Type : boolean

Skip the test if true.