Anyone else spend all weekend mitigating the Log4J vulnerability?

#1

tomq_123

Give him six
Joined
Feb 3, 2010
Messages
7,435
Likes
13,833
#1
This thing is crazy. We've had to update all our applications directly to both Log4J v. 2.15 and add in the JAVA_OPTS: -Dlog4j2.formatMsgNoLookups=true to all our applications. Hardest part has been tracing downstream dependencies that might run on the same JVM (AppD, NewRelic, Datadog, etc....). Plus, we are now finding that our NodeJS apps might also be vulnerable due to downstream dependency agents.
 
  • Like
Reactions: LittleVol
#3
#3
This thing is crazy. We've had to update all our applications directly to both Log4J v. 2.15 and add in the JAVA_OPTS: -Dlog4j2.formatMsgNoLookups=true to all our applications. Hardest part has been tracing downstream dependencies that might run on the same JVM (AppD, NewRelic, Datadog, etc....). Plus, we are now finding that our NodeJS apps might also be vulnerable due to downstream dependency agents.
None of my applications had to be updated, but the company I work for does have a handful that use NodeJS. Can you elaborate on the downstream NodeJS vulnerabilities?
 
#4
#4
None of my applications had to be updated, but the company I work for does have a handful that use NodeJS. Can you elaborate on the downstream NodeJS vulnerabilities?
Mostly AddDynamics, NewRelic,Datadog services running in same server/container instance.
 
Last edited:
  • Like
Reactions: GoVols1998Yeah!
#6
#6
So for us common people, who just got access to what, and what’s it going to cost me?
 
#7
#7
So for us common people, who just got access to what, and what’s it going to cost me?
Interestingly, the initial hack was found via gaining complete and uncontrolled access to a Minecraft server via this exploit. The hacker was able to run commands on the server via the Minecraft chat function (i.e. Delete all files, install this malware, etc...). Log4J is a free and opensource Java programming library (it allows programmers to write logs on what is happening in their applications) and it has been around a very long time and is used almost everywhere Java is used (which is still a lot).
 
  • Like
Reactions: Wireless1
#8
#8
This thing is crazy. We've had to update all our applications directly to both Log4J v. 2.15 and add in the JAVA_OPTS: -Dlog4j2.formatMsgNoLookups=true to all our applications. Hardest part has been tracing downstream dependencies that might run on the same JVM (AppD, NewRelic, Datadog, etc....). Plus, we are now finding that our NodeJS apps might also be vulnerable due to downstream dependency agents.

Are you trying to summon a demon or something?
 
  • Like
Reactions: tbwhhs and hog88
#12
#12
what-the-hell-whats-going-on.gif
 
  • Like
Reactions: StarRaider
#14
#14
Interestingly, the initial hack was found via gaining complete and uncontrolled access to a Minecraft server via this exploit. The hacker was able to run commands on the server via the Minecraft chat function (i.e. Delete all files, install this malware, etc...). Log4J is a free and opensource Java programming library (it allows programmers to write logs on what is happening in their applications) and it has been around a very long time and is used almost everywhere Java is used (which is still a lot).
So are the Chinese poised to take down our electrical grid as a result, or did all the gamers just lose their high scores?
 
  • Like
Reactions: StarRaider
#20
#20
It created a crap ton of work for us. I worked probably 10 hours over last week and abandoned everything else pretty much on my schedule during the week to work on it. That's one of those I would love to run into the sum bitch that came up with it and knock the &^%$ out of 'em.
 
#22
#22
This thing is crazy. We've had to update all our applications directly to both Log4J v. 2.15 and add in the JAVA_OPTS: -Dlog4j2.formatMsgNoLookups=true to all our applications. Hardest part has been tracing downstream dependencies that might run on the same JVM (AppD, NewRelic, Datadog, etc....). Plus, we are now finding that our NodeJS apps might also be vulnerable due to downstream dependency agents.
Sympathies
 

VN Store



Back
Top