{"id":16302,"date":"2021-12-28T13:21:15","date_gmt":"2021-12-28T13:21:15","guid":{"rendered":"https:\/\/www.orangemantra.com\/blog\/?p=16302"},"modified":"2023-08-24T12:42:45","modified_gmt":"2023-08-24T12:42:45","slug":"log4j-vulnerabilities-computer-security-breach-explained","status":"publish","type":"post","link":"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained","title":{"rendered":"Log4j Vulnerabilities, A Serious Computer Security Breach, Explained\u00a0"},"content":{"rendered":"<p><span data-contrast=\"none\">Log4j Vulnerabilities influences a staggering number of PCs, including an obscure, however, almost omnipresent piece of software, Log4j. The product is used to record all ways of exercises that continue in the engine in a vast scope of computer frameworks.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">On Dec. 9, 2021, word got out of a newly found computer bug among the cybersecurity community that started affecting very particular pieces of code in popular software. Soon, every significant <a href=\"https:\/\/www.orangemantra.com\/services\/java-application-development\/\" target=\"_blank\" rel=\"noopener\">Java Development Organization<\/a> was in emergency mode, attempting to sort out how their products were impacted and how they could fix the issue.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">The depictions involved by security specialists portray the new vulnerability in the most common part of code called log4j as apocalyptic.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2><b>What is log4j, and where did it come from?<\/b><\/h2>\n<p><span data-contrast=\"none\">Log4j records events \u2013 errors and routine framework tasks \u2013 and conveys analytic messages about them to framework managers and clients. It&#8217;s open-source programming given by the Apache Software Foundation.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">A typical illustration of Log4j at work is the point at which you type in or click on a web interface and get a\u00a0404 error\u00a0message. The web server running the area of the web interface you attempted to will let you know that there&#8217;s no such website page. It additionally records that event in a log for the server&#8217;s framework management utilizing Log4j.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Diagnostics messages are used all through programming applications. For instance, in the internet game Minecraft, Log4j is used by the server to record data as total memory used and user commands added in the console.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h2 aria-level=\"2\"><b>How does the Log4J shell work?<\/b><\/h2>\n<p><span data-contrast=\"none\">Log4 Shell works by mishandling a component in Log4j that permits clients to determine custom code for designing a log message. This component permits Log4j to, for instance, log not just the username related to each sign-in but to the server as well, in addition, the individual&#8217;s name, assuming that a different server holds a registry connecting client names and other data. The Log4j server needs to speak with the server having actual names.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Unfortunately, this sort of code can be used for something other than organizing log messages. Log4j permits outside servers to submit programming code that can play out a wide range of activities on the designated PC. In Layman\u2019s terms, this opens a doorway for nefarious exercises, for example, stealing sensitive data, assuming responsibility for the targeted framework, and slipping malignant substance to different clients using the impacted server.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><b>How the log4j vulnerability can\u00a0breach\u00a0your security<\/b><\/h3>\n<p><span data-contrast=\"none\">Hackers are looking over the web to observe weak servers and setting up machines that can convey noxious payloads. To do an attack, they query services (for instance, web servers) and attempt to trigger a log message with a 404 error, for example. The queries incorporate vindictively created text, which Log4j processes as instructions.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">These instructions can make an opposite shell, which permits the attacking server to remotely control the targeted server, or they can make the objective server part of a botnet. Botnets utilize numerous hijacked PCs to do hosted activities for the benefit of hackers.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><img decoding=\"async\" class=\"wp-image-16314 size-full aligncenter\" src=\"https:\/\/www.orangemantra.com\/blog\/wp-content\/uploads\/2021\/12\/Blog-1.jpg\" alt=\"hacked - log4j\" width=\"940\" height=\"788\" \/><\/p>\n<p><span data-contrast=\"none\">A large number of hackers are now attempting to manhandle Log4Shell. These attacks range from small developers hacking Minecraft servers to a group of hackers attempting to mine bitcoin and programmers related to China and North Korea attempting to get sufficiently close to sensitive data from their international adversaries. The Belgian service of protection detailed that its PCs were being hacked utilizing Log4Shell.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<h3><b>Mitigation\u00a0of Vulnerabilities<\/b><\/h3>\n<p><span data-contrast=\"auto\"><a href=\"https:\/\/www.orangemantra.com\/blog\/what-makes-java-development-an-ideal-choice-for-enterprise-applications\/\" target=\"_blank\" rel=\"noopener\">Java Application Developers<\/a> have released a list of fixes and the clients are encouraged to update their Log4j to variant 2.16.0, assuming updating the rendition is conceivable. This advice and the accompanying strategies assist with diminishing the effects of vulnerability:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3><b>Update your servers<\/b><\/h3>\n<p><span data-contrast=\"auto\">The best fix against these vulnerabilities is to fix log4j to 2.16.0 or more:<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Log4j 1.x mitigation: Log4j 1.x isn&#8217;t affected by this vulnerability.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"auto\">Log4j 2.x mitigation: Implement one of the methods given below.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<ul>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"1\" data-aria-level=\"1\"><span data-contrast=\"auto\">Java 8 (or later) clients should migrate up to 2.16.0.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"2\" data-aria-level=\"1\"><span data-contrast=\"auto\">Clients requiring Java 7 should migrate up to 2.12.2 when it launches (Currently under development, expected to be available soon).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<li data-leveltext=\"\u25cf\" data-font=\"\" data-listid=\"1\" aria-setsize=\"-1\" data-aria-posinset=\"3\" data-aria-level=\"1\"><span data-contrast=\"auto\">In any case, remove the\u00a0JndiLookup\u00a0class from the\u00a0classpath: zip &#8211; q &#8211; d log4j-core*.jar:organization\/apache\/logging\/log4j\/core\/query\/JndiLookup.class<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/li>\n<\/ul>\n<p><span data-contrast=\"auto\">Note that just the log4j-core JAR file is affected by this vulnerability. Applications utilizing just the log4j-software execute JAR file without the log4j-core JAR document are not affected by this vulnerability.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3><b>Firewall<\/b><\/h3>\n<p><span data-contrast=\"auto\">Utilizing active firewall rules on servers is a decent alleviation strategy to forestall hackers. On the off chance that the server can make DNS queries and attackers filter for weak vulnerabilities of log4j2 which will trigger the DNS query. Even though hackers can without much of a stretch detour firewalls, having a firewall as the first layer of cybersecurity can hinder the active associations of a real assault and give some level of safety.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3><b>Eliminate the container documents<\/b><\/h3>\n<p><span data-contrast=\"auto\">Eliminating the jar files will break logging using log4j 2, yet this is likely the most vulnerable remediation procedure as it is meddlesome and prone to error.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:0,&quot;335559740&quot;:276}\">\u00a0<\/span><\/p>\n<h3><b>Conclusion<\/b><\/h3>\n<p><span data-contrast=\"none\">Considering that Log4j Vulnerabilities is available in different ways in programming, engendering a fix requires coordination from Log4j developers, designers of programming that uses Log4j, software wholesalers, <strong><a href=\"https:\/\/www.orangemantra.com\/services\/software-development\/\" target=\"_blank\" rel=\"noopener\">framework service providers<\/a><\/strong>, and clients. Generally, this presents a deferral between the fix being accessible in the Log4j code and individuals&#8217; PCs shutting the entryway on the vulnerabilities.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-contrast=\"none\">Some estimates that the time-to-fix the software will reach from weeks to months. Be that as it may, if past conduct is demonstrative of future execution, it is likely that the Log4j vulnerabilities will manifest for quite a long time in the future.<\/span><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559740&quot;:240}\"> To ensure a safe passage to the future, <a href=\"https:\/\/www.orangemantra.com\/services\/hire-java-developer\/\" target=\"_blank\" rel=\"noopener\">Hire Java Developers<\/a> from a reputed organization that understands the impact of such serious issues, identify them first hand and resolve them.\u00a0<\/span><\/p>\n<h3><b>FAQs<\/b><\/h3>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\"><strong>Q.<\/strong> <\/span><b><span data-contrast=\"none\">What is Log4j Vulnerability?<\/span><\/b><\/p>\n<p><span data-contrast=\"none\">Log4Shell discovered on December 10, 2021, is a remote code execution (RCE) vulnerability influencing Apache&#8217;s Log4j library, version 2.0-beta9 to 2.14.1. The vulnerability exists in the Java Naming and Directory Interface (JNDI).<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\"><strong>Q.<\/strong> <\/span><b><span data-contrast=\"none\">Who found the Log4j vulnerability?<\/span><\/b><\/p>\n<p><span data-contrast=\"none\">This vulnerability was found by Chen\u00a0Zhaojun\u00a0of Alibaba Cloud Security Team, impacts Apache Log4j 2 forms 2.0 to 2.14.1. The vulnerability takes into account unauthenticated remote code execution. Log4j 2 is an open-source Java logging library created by the Apache Foundation.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n<p><b><span data-contrast=\"none\">Q. What is the difference between Log4j and log4j2?<\/span><\/b><\/p>\n<p><span data-contrast=\"none\">Log4j 1. x isn&#8217;t effectively kept up with, while Log4j 2 has a functioning community where queries are addressed, features are added and errors are fixed. Naturally, reload its configuration upon change without losing log events while reconfiguring.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335551550&quot;:1,&quot;335551620&quot;:1,&quot;335559739&quot;:0,&quot;335559740&quot;:240}\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Log4j Vulnerabilities influences a staggering number of PCs, including an obscure, however, almost omnipresent piece of software, Log4j. The product is used to record all ways of exercises that continue in the engine in a vast scope of computer frameworks.\u00a0 On Dec. 9, 2021, word got out of a newly found computer bug among the [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":16304,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[806,809,236],"tags":[],"class_list":["post-16302","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-insights","category-technologies","category-web-development"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.6 (Yoast SEO v22.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Log4j Vulnerabilities, A Serious Computer Security Breach<\/title>\n<meta name=\"description\" content=\"Log4Shell, a web vulnerability that influences a staggering number of PCs, includes an obscure almost omnipresent piece of software, Log4j\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Log4j Vulnerabilities, A Serious Computer Security Breach\" \/>\n<meta property=\"og:description\" content=\"Log4Shell, a web vulnerability that influences a staggering number of PCs, includes an obscure almost omnipresent piece of software, Log4j\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/OrangeMantraIndia\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-28T13:21:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-24T12:42:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.orangemantra.com\/blog\/wp-content\/uploads\/2021\/12\/Log4j-vulnerability.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1160\" \/>\n\t<meta property=\"og:image:height\" content=\"644\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Siddhant Sharma\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@OrangeMantraggn\" \/>\n<meta name=\"twitter:site\" content=\"@OrangeMantraggn\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Siddhant Sharma\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/\"},\"author\":{\"name\":\"Siddhant Sharma\",\"@id\":\"https:\/\/www.orangemantra.com\/blog\/#\/schema\/person\/a66f652c206c79e753880fb0ead9d813\"},\"headline\":\"Log4j Vulnerabilities, A Serious Computer Security Breach, Explained\u00a0\",\"datePublished\":\"2021-12-28T13:21:15+00:00\",\"dateModified\":\"2023-08-24T12:42:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/\"},\"wordCount\":1143,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.orangemantra.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.orangemantra.com\/blog\/wp-content\/uploads\/2021\/12\/Log4j-vulnerability.png\",\"articleSection\":[\"News and Insights\",\"Technologies\",\"Web development\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/\",\"url\":\"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/\",\"name\":\"Log4j Vulnerabilities, A Serious Computer Security Breach\",\"isPartOf\":{\"@id\":\"https:\/\/www.orangemantra.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.orangemantra.com\/blog\/wp-content\/uploads\/2021\/12\/Log4j-vulnerability.png\",\"datePublished\":\"2021-12-28T13:21:15+00:00\",\"dateModified\":\"2023-08-24T12:42:45+00:00\",\"description\":\"Log4Shell, a web vulnerability that influences a staggering number of PCs, includes an obscure almost omnipresent piece of software, Log4j\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/#primaryimage\",\"url\":\"https:\/\/www.orangemantra.com\/blog\/wp-content\/uploads\/2021\/12\/Log4j-vulnerability.png\",\"contentUrl\":\"https:\/\/www.orangemantra.com\/blog\/wp-content\/uploads\/2021\/12\/Log4j-vulnerability.png\",\"width\":1160,\"height\":644,\"caption\":\"Log4j vulnerability\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.orangemantra.com\/blog\/#website\",\"url\":\"https:\/\/www.orangemantra.com\/blog\/\",\"name\":\"OrangeMantra\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.orangemantra.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.orangemantra.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.orangemantra.com\/blog\/#organization\",\"name\":\"OrangeMantra\",\"url\":\"https:\/\/www.orangemantra.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.orangemantra.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.orangemantra.com\/blog\/wp-content\/uploads\/2023\/12\/orangemantra.png\",\"contentUrl\":\"https:\/\/www.orangemantra.com\/blog\/wp-content\/uploads\/2023\/12\/orangemantra.png\",\"width\":239,\"height\":239,\"caption\":\"OrangeMantra\"},\"image\":{\"@id\":\"https:\/\/www.orangemantra.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/OrangeMantraIndia\",\"https:\/\/x.com\/OrangeMantraggn\",\"https:\/\/www.linkedin.com\/company\/orange-mantra\",\"https:\/\/www.pinterest.com\/orangemantra\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.orangemantra.com\/blog\/#\/schema\/person\/a66f652c206c79e753880fb0ead9d813\",\"name\":\"Siddhant Sharma\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.orangemantra.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0f3f914232a74b633a64d0160129a16d79dbc53920db66ae7ee51fe210f8cb80?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0f3f914232a74b633a64d0160129a16d79dbc53920db66ae7ee51fe210f8cb80?s=96&d=mm&r=g\",\"caption\":\"Siddhant Sharma\"},\"sameAs\":[\"https:\/\/www.orangemantra.com\/\"],\"url\":\"https:\/\/www.orangemantra.com\/blog\/author\/siddhant\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Log4j Vulnerabilities, A Serious Computer Security Breach","description":"Log4Shell, a web vulnerability that influences a staggering number of PCs, includes an obscure almost omnipresent piece of software, Log4j","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/","og_locale":"en_US","og_type":"article","og_title":"Log4j Vulnerabilities, A Serious Computer Security Breach","og_description":"Log4Shell, a web vulnerability that influences a staggering number of PCs, includes an obscure almost omnipresent piece of software, Log4j","og_url":"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/","article_publisher":"https:\/\/www.facebook.com\/OrangeMantraIndia","article_published_time":"2021-12-28T13:21:15+00:00","article_modified_time":"2023-08-24T12:42:45+00:00","og_image":[{"width":1160,"height":644,"url":"https:\/\/www.orangemantra.com\/blog\/wp-content\/uploads\/2021\/12\/Log4j-vulnerability.png","type":"image\/png"}],"author":"Siddhant Sharma","twitter_card":"summary_large_image","twitter_creator":"@OrangeMantraggn","twitter_site":"@OrangeMantraggn","twitter_misc":{"Written by":"Siddhant Sharma","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/#article","isPartOf":{"@id":"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/"},"author":{"name":"Siddhant Sharma","@id":"https:\/\/www.orangemantra.com\/blog\/#\/schema\/person\/a66f652c206c79e753880fb0ead9d813"},"headline":"Log4j Vulnerabilities, A Serious Computer Security Breach, Explained\u00a0","datePublished":"2021-12-28T13:21:15+00:00","dateModified":"2023-08-24T12:42:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/"},"wordCount":1143,"commentCount":0,"publisher":{"@id":"https:\/\/www.orangemantra.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/www.orangemantra.com\/blog\/wp-content\/uploads\/2021\/12\/Log4j-vulnerability.png","articleSection":["News and Insights","Technologies","Web development"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/","url":"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/","name":"Log4j Vulnerabilities, A Serious Computer Security Breach","isPartOf":{"@id":"https:\/\/www.orangemantra.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/#primaryimage"},"image":{"@id":"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/#primaryimage"},"thumbnailUrl":"https:\/\/www.orangemantra.com\/blog\/wp-content\/uploads\/2021\/12\/Log4j-vulnerability.png","datePublished":"2021-12-28T13:21:15+00:00","dateModified":"2023-08-24T12:42:45+00:00","description":"Log4Shell, a web vulnerability that influences a staggering number of PCs, includes an obscure almost omnipresent piece of software, Log4j","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.orangemantra.com\/blog\/log4j-vulnerabilities-computer-security-breach-explained\/#primaryimage","url":"https:\/\/www.orangemantra.com\/blog\/wp-content\/uploads\/2021\/12\/Log4j-vulnerability.png","contentUrl":"https:\/\/www.orangemantra.com\/blog\/wp-content\/uploads\/2021\/12\/Log4j-vulnerability.png","width":1160,"height":644,"caption":"Log4j vulnerability"},{"@type":"WebSite","@id":"https:\/\/www.orangemantra.com\/blog\/#website","url":"https:\/\/www.orangemantra.com\/blog\/","name":"OrangeMantra","description":"","publisher":{"@id":"https:\/\/www.orangemantra.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.orangemantra.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.orangemantra.com\/blog\/#organization","name":"OrangeMantra","url":"https:\/\/www.orangemantra.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.orangemantra.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.orangemantra.com\/blog\/wp-content\/uploads\/2023\/12\/orangemantra.png","contentUrl":"https:\/\/www.orangemantra.com\/blog\/wp-content\/uploads\/2023\/12\/orangemantra.png","width":239,"height":239,"caption":"OrangeMantra"},"image":{"@id":"https:\/\/www.orangemantra.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/OrangeMantraIndia","https:\/\/x.com\/OrangeMantraggn","https:\/\/www.linkedin.com\/company\/orange-mantra","https:\/\/www.pinterest.com\/orangemantra"]},{"@type":"Person","@id":"https:\/\/www.orangemantra.com\/blog\/#\/schema\/person\/a66f652c206c79e753880fb0ead9d813","name":"Siddhant Sharma","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.orangemantra.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0f3f914232a74b633a64d0160129a16d79dbc53920db66ae7ee51fe210f8cb80?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0f3f914232a74b633a64d0160129a16d79dbc53920db66ae7ee51fe210f8cb80?s=96&d=mm&r=g","caption":"Siddhant Sharma"},"sameAs":["https:\/\/www.orangemantra.com\/"],"url":"https:\/\/www.orangemantra.com\/blog\/author\/siddhant\/"}]}},"_links":{"self":[{"href":"https:\/\/www.orangemantra.com\/blog\/wp-json\/wp\/v2\/posts\/16302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.orangemantra.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.orangemantra.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.orangemantra.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.orangemantra.com\/blog\/wp-json\/wp\/v2\/comments?post=16302"}],"version-history":[{"count":18,"href":"https:\/\/www.orangemantra.com\/blog\/wp-json\/wp\/v2\/posts\/16302\/revisions"}],"predecessor-version":[{"id":19069,"href":"https:\/\/www.orangemantra.com\/blog\/wp-json\/wp\/v2\/posts\/16302\/revisions\/19069"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.orangemantra.com\/blog\/wp-json\/wp\/v2\/media\/16304"}],"wp:attachment":[{"href":"https:\/\/www.orangemantra.com\/blog\/wp-json\/wp\/v2\/media?parent=16302"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.orangemantra.com\/blog\/wp-json\/wp\/v2\/categories?post=16302"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.orangemantra.com\/blog\/wp-json\/wp\/v2\/tags?post=16302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}