Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-45046— Apache Log4j2 Thread Context Message Pattern and Context Lookup Pattern vulnerable to a denial of service attack

KEV · Ransomware EPSS 94.34% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-45046

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Apache Log4j2 Thread Context Message Pattern and Context Lookup Pattern vulnerable to a denial of service attack
Source: NVD (National Vulnerability Database)
Vulnerability Description
It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was incomplete in certain non-default configurations. This could allows attackers with control over Thread Context Map (MDC) input data when the logging configuration uses a non-default Pattern Layout with either a Context Lookup (for example, $${ctx:loginId}) or a Thread Context Map pattern (%X, %mdc, or %MDC) to craft malicious input data using a JNDI Lookup pattern resulting in an information leak and remote code execution in some environments and local code execution in all environments. Log4j 2.16.0 (Java 8) and 2.12.2 (Java 7) fix this issue by removing support for message lookup patterns and disabling JNDI functionality by default.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
表达式语言语句中使用的特殊元素转义处理不恰当(表达式语言注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache Log4j 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Log4j是美国阿帕奇(Apache)基金会的一款基于Java的开源日志记录工具。 Apache Log4j 2.15.0版本存在代码问题漏洞,该漏洞源于当日志配置使用非默认模式布局和上下文查找或线程上下文映射模式使用 JNDI 查找模式制作恶意输入数据,从而导致拒绝服务攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache Log4j Apache Log4j2 ~ 2.16.0 -

II. Public POCs for CVE-2021-45046

#POC DescriptionSource LinkShenlong Link
1Windows Server Log4j Scanner - Powershell - CVE-2021-45046 and CVE-2021-44228https://github.com/X1pe0/Log4J-Scan-WinPOC Details
2Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046https://github.com/cckuailong/Log4j_CVE-2021-45046POC Details
3Oh no another onehttps://github.com/BobTheShoplifter/CVE-2021-45046-InfoPOC Details
4Replicating CVE-2021-45046https://github.com/tejas-nagchandi/CVE-2021-45046POC Details
5Nonehttps://github.com/pravin-pp/log4j2-CVE-2021-45046POC Details
6Public testing data. Samples of log4j library versions to help log4j scanners / detectors improve their accuracy for detecting CVE-2021-45046 and CVE-2021-44228. TAG_TESTING, OWNER_KEN, DC_PUBLIChttps://github.com/mergebase/log4j-samplesPOC Details
7A simple script to remove Log4J JndiLookup.class from jars in a given directory, to temporarily protect from CVE-2021-45046 and CVE-2021-44228.https://github.com/lukepasek/log4jjndilookupremovePOC Details
8Nonehttps://github.com/ludy-dev/cve-2021-45046POC Details
9Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check whether it's affected by log4j2 remote code execution vulnerability (CVE-2021-45046)https://github.com/lijiejie/log4j2_vul_local_scannerPOC Details
10Log4Shell(CVE-2021-45046) Sandbox Signaturehttps://github.com/CaptanMoss/Log4Shell-Sandbox-SignaturePOC Details
11Nonehttps://github.com/shaily29-eng/CyberSecurity_CVE-2021-45046POC Details
12Apache Log4j2 Thread Context Lookup Pattern is vulnerable to remote code execution in certain non-default configurations.https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2021/CVE-2021-45046.yamlPOC Details
13Apache Log4j2 Thread Context Lookup Pattern is vulnerable to remote code execution in certain non-default configurations.https://github.com/projectdiscovery/nuclei-templates/blob/main/dast/cves/2021/CVE-2021-45046.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-45046

登录查看更多情报信息。

Same Patch Batch · Apache Software Foundation · 2021-12-14 · 3 CVEs total

CVE-2021-4104Deserialization of untrusted data in JMSAppender in Apache Log4j 1.2
CVE-2021-44549SMTPS server hostname not checked when making TLS connection to SMTPS server

IV. Related Vulnerabilities

V. Comments for CVE-2021-45046

No comments yet


Leave a comment