From: Michael W. <wes...@ja...> - 2021-12-15 08:17:18
|
Extracting from the JAR file worked for me with both the log4j-core-2.14.1.jar included with eXist 5.3.0 and with the log4j-core-2.15.0.jar that I downloaded. What I want to know is what are the signs of infection? I doubt if my systems are prime targets, but if someone was doing an automated spray to see what caught, what should I be looking for? I remember the PUT vulnerability a few years ago and found some attempts at PUTing PHP files on my server. They went into the eXist database at the /db root where they weren't effective. But their presence had me on edge. 2021年12月15日(水) 16:17 Pietro Liuzzo <pie...@gm...>: > Thanks! > > I have tried to do this as well but I am told that there is nothing to do. > perhaps the location of that class depends on the system? > > all best > Pietro > > Pietro Maria Liuzzo (egli/lui,he/him,er/ihn) > cel (DE): +49 (0) 176 61 000 606 > Skype: pietro.liuzzo (Quingentole) > ORCID: https://orcid.org/0000-0001-5714-4011 > Academia: https://uni-hamburg.academia.edu/PietroMariaLiuzzo > > > > > > > Il giorno 14 dic 2021, alle ore 22:27, Clark, Ash < > as....@no...> ha scritto: > > zip -q -d log4j-core-*.jar > org/apache/logging/log4j/core/lookup/JndiLookup.class > > > _______________________________________________ > Exist-open mailing list > Exi...@li... > https://lists.sourceforge.net/lists/listinfo/exist-open > -- Michael Westbay Writer/System Administrator http://www.japanesebaseball.com/ |