{"id":3549,"date":"2021-12-18T20:19:06","date_gmt":"2021-12-18T19:19:06","guid":{"rendered":"https:\/\/sajberinfo.com\/2022\/11\/21\/text-90\/"},"modified":"2022-12-04T13:15:54","modified_gmt":"2022-12-04T12:15:54","slug":"log4j-praznicni-poklon-koji-niko-ne-zeli","status":"publish","type":"post","link":"https:\/\/sajberinfo.com\/en\/2021\/12\/18\/log4j-praznicni-poklon-koji-niko-ne-zeli\/","title":{"rendered":"Log4j: Prazni\u010dni \u201epoklon\u201c koji niko ne \u017eeli"},"content":{"rendered":"<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Pro\u0161le sedmice, otkrivena je ranjivost <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228\" target=\"_blank\" rel=\"noopener\">CVE-2021-44228<\/a><\/span> nazvana <em>Log4j<\/em> ili <em>Log4Shell<\/em> koja omogu\u0107ava napada\u010du daljinski izvr\u0161avanje proizvoljnog k\u00f4da i preuzimanje potpune kontrole nad ranjivim ure\u0111ajima. Rije\u010d je konkretno o <i>Apache Log4j <\/i>biblioteci za evidentiranje otvorenog koda koju koriste aplikacije i servisi \u0161irom Interneta \u010dija ranjivost je ozna\u010dena sa kriti\u010dno uz <em>CVSS<\/em> oznaku 10\/10. Ranjivost poga\u0111a sve sisteme i servise koji koriste <em>Apache Log4j<\/em> od verzije 2.0 do verzije 2.14.1. Kako bi se stekla slika cijelog problema, dovoljno je re\u0107i da su neke od pogo\u0111enih kompanija\u00a0 <em>Amazon, Twitter, Valve, Oracle, Cisco, IBM, Fortinet, VMware, Apple<\/em>\u00a0 i druge. <\/span><\/span><\/p>\n<div id=\"attachment_3634\" style=\"width: 1034px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-3634\" class=\"size-full wp-image-3634\" src=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2021\/12\/Log4j-1024x768-1.jpg\" alt=\"Log4Shell Holiday Present\" width=\"1024\" height=\"724\" srcset=\"https:\/\/sajberinfo.com\/wp-content\/uploads\/2021\/12\/Log4j-1024x768-1.jpg 1024w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2021\/12\/Log4j-1024x768-1-300x212.jpg 300w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2021\/12\/Log4j-1024x768-1-768x543.jpg 768w, https:\/\/sajberinfo.com\/wp-content\/uploads\/2021\/12\/Log4j-1024x768-1-18x12.jpg 18w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><p id=\"caption-attachment-3634\" class=\"wp-caption-text\">Log4j: Prazni\u010dni \u201epoklon\u201c koji niko ne \u017eeli<\/p><\/div>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Nakon objavljivanja ove ranjivosti pro\u0161le sedmice, odmah je primije\u0107eno masovno <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/www.greynoise.io\/blog\/apache-log4j-vulnerability-CVE-2021-44228\" target=\"_blank\" rel=\"noopener\">aktivno skeniranje<\/a><\/span> kako bi se otkrili ranjivi serveri. Sigurnosni istra\u017eiva\u010di ka\u017eu da se otkrivena ranjivost koristi za instaliranje softvera za rudarenje kriptovaluta, pridru\u017eivanje ure\u0111aja <em>Linux <\/em>bot mre\u017eama, instaliranje <em>ransomware<\/em>-a\u00a0 i preuzimanje raznih osjetljivih informacija sa pogo\u0111enih servera. Posebnu brigu izaziva jednostavnost kojom se ovaj sigurnosna ranjivost mo\u017ee iskoristiti za pristup serverima bez potrebe za upisivanjem lozinki. Kompanija\u00a0 <em>Apache<\/em> je odmah izdala sigurnosno a\u017euriranje u verziji 2.15.0, ali \u010dinilo se da s obzirom na kompleksnost okru\u017eenja i potrebno vrijeme da se implementira to ne\u0107e biti brzo. Sigurnosni istra\u017eiva\u010di su upozorili da je ovo biblioteka koju koriste mnogi proizvodi, pa sama primjena a\u017euriranja ne\u0107e rije\u0161iti problem. Sigurnosni timovi trebaju dodatnog vremena da urade temeljnu provjeru kako bi uo\u010dili da li u sada a\u017euriranom okru\u017eenju ima tragova uljeza, kao i za njegovo uklanjanje ako je prisutan.<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Me\u0111utim, ispostavilo se da a\u017euriranje\u00a0 u verziji 2.15.0 ne otklanja u potpunosti ranjivost pogo\u0111enih sistema, jer su sigurnosni istra\u017eiva\u010di na a\u017euriranoj verziji <em>Log4J<\/em><i> 2.15.0<\/i> otkrili ranjivost <em><span lang=\"sr-Latn-BA\"><a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-45046\" target=\"_blank\" rel=\"noopener\">CVE-2021-45046<\/a><\/span><\/em> sa <em>CVSS <\/em>oznakom 9\/10. Ova ranjivost omogu\u0107ava napada\u010du da preuzme kontrolu nad <em>Thread Context Map<\/em> (<em>MDC<\/em>) \u0161to\u00a0 rezultira uskra\u0107ivanjem servisa, odnosno onemogu\u0107avanje sistema koji pru\u017ea uslugu korisnicima kroz <a href=\"https:\/\/sajberinfo.com\/en\/2022\/04\/25\/ddos\/\" target=\"_blank\" rel=\"noopener\"><em>DDoS <\/em>napad<\/a>. Nije pro\u0161lo puno vremena, otkriven je i propust u\u00a0 <em>Log4J <\/em><i>2.16.0<\/i> verziji ozna\u010den sa <em><span lang=\"sr-Latn-BA\"><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-45105\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">CVE-2021-45105<\/span><\/a><\/span><\/em> sa <em>CVSS<\/em> oznakom 7.5\/10. Trenutno je dostupna <em>Log4j <\/em><i>2.17.0<\/i> verzija a\u017euriranja koja za sada popravlja sve navedene sigurnosne propuste.<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Paralelno sa navedenim de\u0161avanjima, pogo\u0111ene kompanije su po\u010dele da sprovode istragu u svojim proizvodima,da objavljuju rezultate i savjetuju o privremenim koracima za\u0161tite. Navesti \u0107emo neke od kompanija:<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><em><strong>Adobe:<\/strong> <\/em>Kompanija aktivno a\u017eurira svoje servere, a dostupne informacije pogledajte <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/helpx.adobe.com\/security\/security-bulletin.html#:~:text=08\/13\/2019-,Adobe ColdFusion,-Brief\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>. Za proizvode za koje nije dostupno a\u017euriranje, preporuke za za\u0161titu mo\u017eete pogledati <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/helpx.adobe.com\/coldfusion\/kb\/log4j-vulnerability-coldfusion.html#:~:text=ColdFusion (2021 release)\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>.<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><em><strong><span class=\"StrongEmphasis\">Amazon<\/span>: <\/strong><\/em>Kompanija aktivno a\u017eurira svoje servere, a dostupne informacije pogledajte <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/aws.amazon.com\/security\/security-bulletins\/AWS-2021-006\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><em><strong>Broadcom: <\/strong><\/em>Kompanija je objavila podatke za pogo\u0111ene <i>Symantec<\/i> proizvode, vi\u0161e informacija <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/support.broadcom.com\/security-advisory\/content\/security-advisories\/Symantec-Security-Advisory-for-Log4j-2-CVE-2021-44228-Vulnerability\/SYMSA19793\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>.<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><em><strong>Cisco:<\/strong> <\/em>Kompanija je objavila listu pogo\u0111enih proizvoda, a i plan a\u017euriranja <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/tools.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-apache-log4j-qRuKNEbd#vp\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>.<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><em><strong>Citrix: <\/strong><\/em>Kompanija sprovodi istragu, nema liste ranjivih proizvoda. Promjenu statusa pratite <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/support.citrix.com\/article\/CTX335705\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><em><strong>cPanel:<\/strong> <\/em>Forum zajednica tvrdi da je jednino pogo\u0111en proizvod <em>cPanel Solr plugin<\/em> koji mo\u017ee biti iskori\u0161ten samo lokalno. Vi\u0161e informacija i preporuke za za\u0161titu mo\u017eete pogledati <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/forums.cpanel.net\/threads\/log4j-cve-2021-44228-does-it-affect-cpanel.696249\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong><em>Debian:<\/em><\/strong> Objavljeno je a\u017euriranje za <em>Debian<\/em><i> 9<\/i> (<em>Stretch<\/em>), 10 (<em>Buster<\/em>), 11 (<em>Bullseye<\/em>) i 12 (<em>Bookworm<\/em>). Vi\u0161e informacija <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2021-44228\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>.<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><em><strong>FortiGuard: <\/strong><\/em>Objavljena je lista sa velikim brojem pogo\u0111enih ure\u0111aja. Dostupna su a\u017euriranja i preporuke za za\u0161titu. Vi\u0161e informacija <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/www.fortiguard.com\/psirt\/FG-IR-21-245\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><em><strong>IBM:<\/strong> <\/em>Kompanija je objavila da je za sada pogo\u0111eni proizvod samo <em>WebSphere Application Serveru<\/em> verziji 9.0 i 8.5. Vi\u0161e informacija <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/www.ibm.com\/blogs\/psirt\/security-bulletin-vulnerability-in-apache-log4j-affects-websphere-application-server-cve-2021-44228\/\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><em><strong>Okta:<\/strong> <\/em>Kompanija je izdala a\u017euriranje za <em>Okta RADIUS Server Agent<\/em> i <em>Okta On-Prem MFA Agent <\/em>i preporu\u010duje da se odmah primjeni. Vi\u0161e informacija <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/sec.okta.com\/articles\/2021\/12\/log4shell\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><em><strong>Oracle: <\/strong><\/em>Kompanija je izjavila da su brojni njeni proizvodi pogo\u0111eni, bez otkrivanja ta\u010dnog broja. Preporu\u010duje da se svako dostupno a\u017euriranje primjeni \u0161to prije. Vi\u0161e informacija <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/blogs.oracle.com\/security\/post\/cve-2021-44228\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong><em>Red Hat:<\/em><\/strong> Kompanija je objavila a\u017euriranja i savjetuje hitnu primjenu. Vi\u0161e informacija <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/access.redhat.com\/security\/vulnerabilities\/RHSB-2021-009#updates-for-affected-products\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><em><strong>Splunk:<\/strong><\/em> Kompanija ka\u017ee da proizvod <em>Core Splunk Enterprise<\/em> nije pogo\u0111en ako se ne koristi <em>Data Fabric Search<\/em>. Kompanija je izdala a\u017euriranja za neke od svoji proizvoda. Vi\u0161e informacija <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/www.splunk.com\/en_us\/blog\/bulletins\/splunk-security-advisory-for-apache-log4j-cve-2021-44228.html\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong><em>VMware: <\/em><\/strong>Kompanija je ispravila ranjivosti u nekoliko svojih proizvoda, a trenutno radi na izdavanju za jo\u0161 ne\u0161to vi\u0161e od 20 proizvoda. Vi\u0161e informacija i preporuke za za\u0161titu mo\u017eete pogledati <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2021-0028.html\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>.<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong><em>Ubiquiti:<\/em><\/strong> Kompanija je objavila a\u017euriranja i\u00a0 preporuke za za\u0161titu. Vi\u0161e informacija <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/community.ui.com\/releases\/UniFi-Network-Application-6-5-54\/d717f241-48bb-4979-8b10-99db36ddabe1\" target=\"_blank\" rel=\"noopener\"><span style=\"text-decoration: none;\">ovdje<\/span><\/a><\/span>.<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\"><strong><em>Ubuntu: <\/em><\/strong>Kompanija je objavila a\u017euriranja za <em>Upstream, Ubuntu <\/em>18.04 <em>LTS <\/em>(<em>Bionic Beaver<\/em>), 20.04 <em>LTS<\/em> (<em>Focal Fossa<\/em>), 21.04 (<em>Hirsute Hippo<\/em>), i 21.10 (<em>Impish Indri<\/em>). Vi\u0161e informacija <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/ubuntu.com\/security\/CVE-2021-44228\" target=\"_blank\" rel=\"noopener\">ovdje<\/a><\/span>.<\/span><\/span><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">\u00a0<\/span><\/span><\/p>\n<p class=\"MsoNormal\" style=\"text-align: left;\"><span style=\"font-size: 14pt;\"><span style=\"font-family: inherit;\">Ovo iznad nije ni pribli\u017eno lista svih pogo\u0111enih proizvo\u0111a\u010da i proizvoda. <em>CISA<\/em> je objavila listu na <em>GitHub<\/em>-u koju mo\u017eete pogledati <span lang=\"sr-Latn-BA\"><a href=\"https:\/\/github.com\/cisagov\/log4j-affected-db\" target=\"_blank\" rel=\"noopener\">ovdje<\/a><\/span> ili posjetite stranicu proizvo\u0111a\u010da. Kada sve sumiramo, razvoj situacije u kiberneti\u010dkom prostoru pokazuje da, ako ve\u0107 nije, moglo bi se desiti da se mnogima pokvari prazni\u010dno raspolo\u017eenje.<\/span><\/span><\/p>","protected":false},"excerpt":{"rendered":"<p>Pro\u0161le sedmice, otkrivena je ranjivost CVE-2021-44228 nazvana Log4j ili Log4Shell koja omogu\u0107ava napada\u010du daljinski izvr\u0161avanje proizvoljnog k\u00f4da i preuzimanje potpune kontrole nad ranjivim ure\u0111ajima. Rije\u010d je konkretno o Apache Log4j biblioteci za evidentiranje otvorenog&#46;&#46;&#46;<\/p>","protected":false},"author":1,"featured_media":3634,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[154,113,123,153,63,93,133,64,126],"class_list":["post-3549","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hronike","tag-apache","tag-botnet","tag-github","tag-log4j","tag-lozinka","tag-malware","tag-ransomware","tag-sajber-prijetnja","tag-vulnerability"],"_links":{"self":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3549","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/comments?post=3549"}],"version-history":[{"count":0,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/posts\/3549\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media\/3634"}],"wp:attachment":[{"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/media?parent=3549"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/categories?post=3549"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajberinfo.com\/en\/wp-json\/wp\/v2\/tags?post=3549"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}