Skip to content
Snippets Groups Projects
Commit a4b8b494 authored by Lukas Arnold's avatar Lukas Arnold
Browse files

Explains the choice of the used LDAP approach in more detail

parent 01d7a3be
No related branches found
No related tags found
No related merge requests found
......@@ -44,14 +44,16 @@ public class AttackInterceptor extends InMemoryOperationInterceptor {
// Another approach would be to exploit (de-)serialization of objects which is also supported by LDAP,
// but for this the system property 'com.sun.jndi.ldap.object.trustURLCodebase' must
// have been set to 'true' for almost all Java versions.
// You can read more about it on https://www.innoq.com/en/articles/2022/04/java-jndi/.
// However, the approach can be used in combination with certain classes of libraries for RCE attacks.
// Those classes are also called gadgets, read more about it on: https://github.com/mbechler/marshalsec.
// Other approach: https://www.innoq.com/en/articles/2022/04/java-jndi/
// With this approach, it's not required to set the property for Java version <= 8u191.
// With the factory approach, it's not required to set the property for Java version <= 8u191.
// https://news.ycombinator.com/item?id=29505027
// https://www.lunasec.io/docs/blog/log4j-zero-day/
// We've confirmed this with JDK & JRE 1.8.0u111 available at
// https://www.oracle.com/de/java/technologies/javase/javase8-archive-downloads.html
// We suppose the problem is caused by CVE 2018-3149: https://bugzilla.redhat.com/show_bug.cgi?id=1639834.
try {
// Sends the newly generated malicious entry back to the requester
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment