www.theregister.com
Open in
urlscan Pro
104.18.5.22
Public Scan
URL:
https://www.theregister.com/2021/12/14/apache_log4j_2_16_jndi_disabled/
Submission: On January 12 via api from IN — Scanned from DE
Submission: On January 12 via api from IN — Scanned from DE
Form analysis
4 forms found in the DOMPOST /CBW/custom
<form id="RegCTBWFAC" action="/CBW/custom" class="show_regcf_custom" method="POST">
<h5>Manage Cookie Preferences</h5>
<ul>
<li>
<label>
<input type="checkbox" disabled="disabled" checked="checked" name="necessary" value="necessary">
<strong>Necessary</strong>. <strong>Always active</strong>
</label>
<label for="accordion_necessary" class="accordion_toggler">Read more<img width="7" height="10" alt="" src="/design_picker/d2e337b97204af4aa34dda04c4e5d56d954b216f/graphics/icon/arrow_down_grey.svg" class="accordion_arrow"></label>
<div class="accordion">
<input type="checkbox" id="accordion_necessary">
<p class="accordion_info"> These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect. </p>
</div>
</li>
<li>
<label>
<input type="checkbox" name="tailored_ads" value="tailored_ads">
<strong>Tailored Advertising</strong>. </label>
<label for="accordion_advertising_tailored_ads" class="accordion_toggler">Read more<img width="7" height="10" alt="" src="/design_picker/d2e337b97204af4aa34dda04c4e5d56d954b216f/graphics/icon/arrow_down_grey.svg"
class="accordion_arrow"></label>
<div class="accordion">
<input type="checkbox" id="accordion_advertising_tailored_ads">
<p class="accordion_info"> These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers,
and in some cases selecting advertisements that are based on your interests. </p>
</div>
</li>
<li>
<label>
<input type="checkbox" name="analytics" value="analytics">
<strong>Analytics</strong>. </label>
<label for="accordion_analytics" class="accordion_toggler">Read more<img width="7" height="10" alt="" src="/design_picker/d2e337b97204af4aa34dda04c4e5d56d954b216f/graphics/icon/arrow_down_grey.svg" class="accordion_arrow"></label>
<div class="accordion">
<input type="checkbox" id="accordion_analytics">
<p class="accordion_info"> These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our
sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance. </p>
</div>
</li>
</ul> See also our <a href="https://www.theregister.com/Profile/cookies/">Cookie policy</a> and <a href="https://www.theregister.com/Profile/privacy/">Privacy policy</a>. <input type="submit" value="Accept Selected" class="reg_btn_primary"
name="accept" id="RegCTBWFBAC">
</form>
POST /CBW/all
<form id="RegCTBWFAA" action="/CBW/all" method="POST" class="hide_regcf_custom">
<input type="submit" value="Accept All Cookies" name="accept" class="reg_btn_primary" id="RegCTBWFBAA">
</form>
POST https://account.theregister.com/register/
<form action="https://account.theregister.com/register/" method="POST" id="aug_signup_link_0">
<h2 class="product_title">Get our <strong>weekly</strong> newsletter</h2><input type="hidden" name="thereg_weekly_digest" value="1"><input type="hidden" name="product" value="quick_weekly_newsletter"><input type="hidden" name="forename"
value="The Register"><input type="hidden" name="surname" value="Subscriber"><input type="hidden" name="g-recaptcha-response" value=""><input type="hidden" name="recaptcha" value="1"><input type="hidden" name="country" value="se"><input
type="hidden" name="submit" value="1">
<div class="valign"><input type="email" name="email" placeholder="Enter Email"
value=""><a class="bold quick_signup_augmentable upg yes_js reg_btn_secondary" data-product="quick_weekly_newsletter" data-pre-email-content="<h2 class=product_title>Get our <strong>Weekly</strong> newsletter</h2>" data-country="se" data-action="https://account.theregister.com/register/" href="https://account.theregister.com/register/?product=quick_weekly_newsletter">Subscribe</a>
</div>
</form>
POST https://account.theregister.com/register/
<form action="https://account.theregister.com/register/" method="POST" id="aug_signup_link_1"><input type="hidden" name="thereg_daily_headlines" value="1"><input type="hidden" name="product" value="quick_daily_newsletter"><input type="hidden"
name="forename" value="The Register"><input type="hidden" name="surname" value="Subscriber"><input type="hidden" name="g-recaptcha-response" value=""><input type="hidden" name="recaptcha" value="1"><input type="hidden" name="country"
value="se"><input type="hidden" name="submit" value="1"><input type="email" name="email" placeholder="Your Work Email Address" value=""><a class="reg_btn_secondary subscribe_newsletter_button quick_signup_augmentable" data-product="quick_daily_newsletter" data-country="se" data-action="https://account.theregister.com/register/" href="https://account.theregister.com/register/?product=thereg_daily_newsletter">
Subscribe
</a></form>
Text Content
Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customise your settings, hit “Customise Settings”. REVIEW AND MANAGE YOUR CONSENT Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer. MANAGE COOKIE PREFERENCES * Necessary. Always active Read more These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect. * Tailored Advertising. Read more These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests. * Analytics. Read more These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance. See also our Cookie policy and Privacy policy. Customise Settings Sign in TOPICS Security Off-Prem All Off-PremEdge + IoTChannelPaaS + IaaSSaaS (X) On-Prem All On-PremServersStorageNetworksHPCPersonal Tech (X) Software All SoftwareAI + MLApplicationsDatabasesDevOpsOSesVirtualization (X) Offbeat All OffbeatDebatesColumnistsScienceGeek's GuideBOFHLegalBootnotesSite NewsAbout Us (X) Vendor Voice All Vendor VoiceAdobeAmazon Web Services (AWS) MigrationGoogle CloudGoogle Cloud's ApigeeGoogle WorkspaceLenovoNutanixRapid7Red hatSophosVeeamVirtru (X) RESOURCES * Whitepapers * Webinars * Newsletters SITUATION PUBLISHING * The Next Platform * Devclass * Blocks and Files GET OUR WEEKLY NEWSLETTER Subscribe SECURITY APACHE TAKES OFF, NUKES INSECURE FEATURE AT THE HEART OF LOG4J FROM ORBIT WITH V2.16 NOW OPEN-SOURCE LOGGING LIBRARY'S JNDI DISABLED ENTIRELY BY DEFAULT, MESSAGE LOOKUPS REMOVED Gareth Corfield Tue 14 Dec 2021 // 23:30 UTC 15 -------------------------------------------------------------------------------- 15 Copy Last week, version 2.15 of the widely used open-source logging library Log4j was released to tackle a critical security hole, dubbed Log4Shell, which could be trivially abused by miscreants to hijack servers and apps over the internet. That release closed the hole (CVE-2021-44228) by disabling by default the Java library's primarily exploitable functionality: JNDI message lookups. Now version 2.16 is out, and it disables all JNDI support by default, and removes message lookup handling entirely for good measure, hopefully finally preventing further exploitation. This is needed because version 2.15 is still exploitable in certain non-default configurations, and this moderate-severity oversight has earned its own bug ID: CVE-2021-45046. Crucially, this move is defense in depth: Apache conceded JNDI "has significant security issues," so it's just deactivated it by default with a fresh release. Version 2.15 was most probably enough to protect you from attack, version 2.16 makes it certain. It all comes as network observers say they're seeing tens of thousands of attempts per minute to exploit internet systems via the logging library, with miscreants using the remote-code-execution hole to steal cloud infrastructure credentials, and deploy cryptocoin miners and ransomware, at least. QUICK LINKS * The logging library is commonly used by Java code and is buried in tons of software, including some security defense products. Some useful commands for finding evidence of Log4j deployments on Linux boxes are listed here * Check Point Research says it's seen at least 60 variants of exploit code used against vulnerable machines * How the flaw was found and reported, and the scramble to patch it in time as word spread of the hole * The US government's hub of information about the vulnerability and what to do next * The Netherlands' National Cyber Security Center's incredible collection of software and other products affected by Log4Shell that will need patching or protecting as well as indicators of compromise and other info * El Reg's coverage of Log4Shell In its latest release notes for Log4j 2.x, the Apache Foundation said: "Dealing with CVE-2021-44228 has shown the JNDI has significant security issues. While we have mitigated what we are aware of it would be safer for users to completely disable it by default, especially since the large majority are unlikely to be using it." Thus version 2.16.0 has shipped with JNDI, the Java Naming and Directory Interface, switched off. JNDI is the API that was explosively discovered to be exploitable in Log4j last week. It's supported by Log4j so that objects can be fetched from remote servers to use in log entries. With JNDI enabled, Log4j could be tricked into fetching Java code from an attacker-controlled server and blindly executing it, compromising the device. To achieve this, the attacker would need to feed some specially crafted text in, say, an app account username or site search query, that when logged by Log4j would trigger the remote code execution. According to the Apache team: From version 2.16.0, the message lookups feature has been completely removed. Lookups in configuration still work. Furthermore, Log4j now disables access to JNDI by default. JNDI lookups in configuration now need to be enabled explicitly. Also, Log4j now limits the protocols by default to only java, ldap, and ldaps and limits the ldap protocols to only accessing Java primitive objects. Hosts other than the local host need to be explicitly allowed. That basically means if you want to use JNDI lookups, you need to take the safeties off your software stack. NCC Group's Jeff Dileo mused in a blog post: "In reality, the JNDI stuff is regrettably more of an 'enterprise' feature than one that developers would just randomly put in if left to their own devices. Enterprise Java is all about antipatterns that invoke code in roundabout ways to the point of obfuscation, and supporting ever more dynamic ways to integrate weird protocols like RMI to load and invoke remote code dynamically in weird ways." Essentially, if you're using (or deploying) Log4j 2.x versions 2.14 or below, upgrade to 2.16, and if you're already on 2.15, consider 2.16 for peace of mind: the JNDI code is not known to be terribly secure. EXPLOITATION PROBABLY FROM CRIMS RATHER THAN NATION STATES Britain's National Cyber Security Centre earlier today said it wasn't seeing much obviously malicious web traffic linked to Log4j other than scanning to identify vulnerable systems, though as the day has worn on, infosec folk say attacks are ramping up. Bitdefender claimed to have seen a ransomware raid on Windows machines involving a Log4j exploit, dubbing the ransomware Khonsari. * Log4j RCE: Emergency patch issued to plug critical auth-free code execution hole in widely used logging utility * Log4j doesn't just blow a hole in your servers, it's reopening that can of worms: Is Big Biz exploiting open source? * Log4j RCE latest: In case you hadn't noticed, this is Really Very Bad, exploited in the wild, needs urgent patching * Timekeeping biz Kronos hit by ransomware and warns customers to engage biz continuity plans Kaspersky Lab published some findings from its telemetry suggesting most exploit attempts were being launched from Russian IP addresses, which in itself doesn't mean anything yet – though it chimes with previously reported information from Bitdefender. For now, developers need to roll out their application and server software with patched versions of Log4j, and organisations need to not only install them but also check to see if they've already been pwned. ® Get our Tech Resources Share Copy 15 Comments SIMILAR TOPICS * Apache Software Foundation * Cybersecurity * Java * Log4j * Security BROADER TOPICS * Programming Language NARROWER TOPICS * Apache HTTP Server * Black Hat * Cybercrime * Cybersecurity and Infrastructure Security Agency * Cybersecurity Information Sharing Act * Data Breach * Data Protection * Data Theft * DDoS * Encryption * Exploit * Hacker * Hacking * Identity Theft * Infosec * NCSC * Palo Alto Networks * Password * Phishing * Ransomware * REvil * Spamming * Spyware * Surveillance * Trojan * Vulnerability * Wannacry Corrections Send us news -------------------------------------------------------------------------------- OTHER STORIES YOU MIGHT LIKE * A SLICE IS BETTER THAN NONE: APPLE GIVES IN, ALLOWS THIRD-PARTY APP BILLING SYSTEMS IN KOREA, PER LOCAL LAW Company follows in the footsteps of its buddy Google Laura Dobberstein Wed 12 Jan 2022 // 13:15 UTC Apple has finally caved to Korea's telecommunication regulator and agreed to allow third-party in-app billing systems in South Korea thus complying with a local law. The iGiant told The Register: Continue reading * UK COMPETITION WATCHDOG CLOSES THE COMMENT BOOK ON MICROSOFT'S NUANCE MERGER European Commission gives an unconditional green light, but Blighty needs a bit more time Richard Speed Wed 12 Jan 2022 // 12:32 UTC If you wanted to speak your brains have your say on Microsoft's acquisition of Nuance, the moment has passed. In the UK at any rate. The Competition and Markets Authority (CMA) has announced an inquiry into the merger. The current statutory deadline for a decision following Phase 1 is 9 March, at which point the CMA might go deeper. Or it might decide earlier to let the acquisition proceed. The CMA is pondering whether Microsoft snapping up Nuance would lessen competition for goods and services within the UK. Its invitation for comment kicked off on 13 December last year and closed this week. The launch of the merger inquiry is the next step in the process. Continue reading * NORTH KOREA SAYS IT'S LAUNCHED A THIRD HYPERSONIC MISSILE, THIS TIME REACHING MACH 10 South Korea piqued as FAA grounds west coast aircraft Laura Dobberstein Wed 12 Jan 2022 // 11:43 UTC 4 North Korean state-sponsored media has said it launched a third hypersonic missile on Tuesday, hitting a target at sea 1,000km (621 miles) away. According to news agency KCNA, President Kim Jong Un attended the test-fire. "Toward daybreak, the Juche weapon representing the power of the DPRK roared to soar into sky, brightening the dawning sky and leaving behind it a column of fire, under the supervision of Kim Jong Un," reported KCNA's Pyongyang Times. The publication claimed the hypersonic missile programme is an effort to bolster the country's war deterrent and this test-fire was a final verification of weapon system's technical specifications. The news outlet said the missile "made glide jump flight from 600km area before making a 240km corkscrew manoeuvring from the initial launch azimuth to the target azimuth" with "superior manoeuvrability." Continue reading * INFO-SATURATED TECHIE BUILDS BUG ALERT SERVICE THAT PHONES YOU TO WARN OF NEW VULNS Or SMSes, if the idea of midnight robot calls worries you Gareth Corfield Wed 12 Jan 2022 // 11:02 UTC 5 An infosec pro fed up of having to follow tedious Twitter accounts to stay on top of cybersecurity developments has set up a website that phones you if there's a new vuln you really need to know about. Bugalert, founded by product manager Matt Sullivan, is a crowdsourced venture that he hopes will take the pain out of trying to tell the signal from the noise when security researchers make high-impact vulnerability disclosures. Keeping up with fast-developing situations, such as the Log4j vuln and its iterations, is "extraordinarily overwhelming," he told The Register – and he reckons relying on CVE number assignations is just too slow in this day and age. (It took around a day and a half for the initial Log4j vuln to be given a CVE in November 2021, before an exploit made its way onto Twitter a week later.) Continue reading * LINUX MINT 20.3 APPEARS – NOW WITH MORE MOZILLA FLAVOR: WHY THIS DISTRO SWITCHED FIREFOX DEFAULTS BACK TO GOOGLE Oh, Snap Liam Proven in Prague Wed 12 Jan 2022 // 10:14 UTC 18 The Linux Mint distro has been busy. Not only has it pushed out release 20.3, it's also announced a deal with Mozilla, meaning vanilla Mozilla versions of Firefox and Thunderbird. It's very hard to estimate the relative popularity of Linux distributions. Aside from a couple of paid enterprise distros, they're all free downloads without serial numbers, activation nor any other tracking mechanisms. One of the only mechanisms is the Distrowatch popularity page, although vendors dispute its accuracy. Saying that, Mint is in third or fourth place, outranking its own upstream distro, Ubuntu, which comes sixth. Each major version of Mint is based upon the long-term support version of Ubuntu: Mint 20 is based on Ubuntu 20.04. Continue reading * DEV'S POSTGRESQL EXPERIMENT PROBES POSSIBILITY OF ZERO-DOWNTIME SCHEMA MIGRATION It has potential, says one expert Lindsay Clark Wed 12 Jan 2022 // 09:29 UTC 2 A Swedish developer has published code that promises to avoid application downtime during PostgreSQL schema migrations. Using "views" in the popular open-source database to encapsulate tables and create a versioned interface, Fabian Lindfors, a final year MSc student in computer science at Lund University, has produced a tool that he hopes can automate zero-downtime migrations. Available on GitHub, Reshape is a command-line tool which works with files that define changes to the database schema. Continue reading * OPEN SOURCE ISN'T THE SECURITY PROBLEM – MISUSING IT IS Security is a process, not a product Steven J. Vaughan-Nichols Wed 12 Jan 2022 // 08:30 UTC 16 Opinion We're going to be cleaning up Apache Log4j security problems for months to come, but the real problem isn't that it was open-source software. It's how we track and use open-source code. When security vulnerabilities were found in the extremely popular open-source Apache Log4j logging library, we knew we were in trouble. What we didn't know was just how much trouble we were in. We know now. Just ask the Belgian defence ministry. In this ongoing security disaster, many people blame open source for all our troubles. In the Financial Times (FT), Richard Waters, the newspaper's west coast editor, wrung his hands, saying it's a "little alarming to discover that, more than two decades into the open-source era, glaring security holes sometimes surprise even the experts." Continue reading * MASSIVE RUGBY-BALL-SHAPED PLANET EMERGES FROM SCRUM OF SPACE 'SCOPE SIGHTINGS It was worth a try Katyanna Quach Wed 12 Jan 2022 // 06:23 UTC 20 Just over 1,500 light-years away in the constellation of Hercules there’s a rugby ball-shaped exoplanet orbiting a star. It’s the first time astronomers have been able to detect such an unusual shape of an alien world. Most planets are more or less spherical due to gravitational forces that pull matter equally in from all sides, yet WASP-103b appears to be elongated. The planet is in an orbit close to its host star, and experiences strong tidal forces that appear to have deformed its surface. The object, twice the radius and 1.5 times as massive as Jupiter, whizzes around its star, WASP-103, in less than a day. A team of astronomers were able to detect its shape after recording detailed measurements of 12 of its orbits using ESA’s Cheops space observatory, and comparing them with previous observations from the Hubble Space Telescope and NASA’s Spitzer Space Telescope. Continue reading * CHINA BUILDS 'FREE TRADE DATA PORT' INCLUSIVE OF SUBMARINE CABLE LANDING STATION If the Middle Kingdom lets its data out, Beijing might as well be in control Laura Dobberstein Wed 12 Jan 2022 // 02:49 UTC 7 China has earmarked ¥31.8bn ($5bn) to build the first free trade data port in the nation as it tries to bolster and control information flowing across its borders, the country's state-sponsored media says. Known as the Nansha International Data Free Trade Port, the project basically involves plumbing in a series of undersea cables and network links, building a data center for handling cross-border data, and constructing industrial parks and labs for AI development, telecommunications, and more. Construction of this 450-acre site is due to start in the first half of 2022 and be in operation by the end of 2025. The aim is to control the data flowing in and out of China. Continue reading * MICROSOFT STARTS 2022 WITH BIG BUNDLE FIXES FOR 96 SECURITY BUGS IN ITS SOFTWARE Nothing is certain except death, taxes, and programming errors Thomas Claburn in San Francisco Wed 12 Jan 2022 // 01:14 UTC 2 Patch Tuesday The new year brings the same old chore of shoring up Microsoft software. For its first Patch Tuesday of 2022, Redmond has bestowed 96 new CVEs affecting its Windows products. If you include 24 Chromium CVEs published earlier this month and now addressed in Microsoft's Edge browser, in addition to two CVEs in open source projects (Curl and Libarchive), you get 122 fixes that need to be applied. Affected systems include: Windows and associated components, Edge, Exchange Server, Office and associated components, SharePoint Server, .NET Framework, Microsoft Dynamics, Windows Hyper-V, Windows Defender, and Windows Remote Desktop Protocol (RDP). Continue reading * US SENATOR MARCO RUBIO CALLS INTEL COWARDS FOR SCRUBBING REMARKS ABOUT XINJIANG AND APOLOGIZING TO CHINA Was no one else available? No one? Katyanna Quach Wed 12 Jan 2022 // 00:38 UTC 20 US Senator Marco Rubio (R-FL) has blasted Intel for scrubbing any mentions of China's Xinjiang region from an annual letter to its suppliers after Chinese netizens threatened on social media to boycott the US chip behemoth. In an earlier version of the letter, published on Intel’s website on December 23, the semiconductor giant reminded its suppliers to make sure they don’t use any labor nor source any goods or services from Xinjiang due to trade restrictions imposed by “multiple governments.” By that, they mean restrictions placed by the US government, among others, due to what more and more clearly appears to be rampant human-rights abuses against Uyghur Muslims in the region. Continue reading ABOUT US * Who we are * Under the hood * Contact us * Advertise with us MORE CONTENT * Latest News * Popular Stories * Forums * Whitepapers * Webinars SITUATION PUBLISHING * The Next Platform * DevClass * Blocks and Files * Continuous Lifecycle London * M-cubed The Register - Independent news and views for the tech community. Part of Situation Publishing SIGN UP TO OUR DAILY NEWSLETTER Subscribe Biting the hand that feeds IT © 1998–2022 Your Consent Options Cookies Privacy Ts&Cs