Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse

The New Coffee Room

  1. TNCR
  2. General Discussion
  3. I guess I should check our server...

I guess I should check our server...

Scheduled Pinned Locked Moved General Discussion
8 Posts 4 Posters 124 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • KlausK Offline
    KlausK Offline
    Klaus
    wrote on last edited by Klaus
    #1

    https://www.wired.com/story/log4j-log4shell/

    That's a rather dramatic vulnerability. If you have any server directly connected to the internet, you should check whether you are affected. If you are, your server has likely already been captured and is running crypto mining software or worse.

    Luckily our server software is Python-based, but I'm not entirely sure that we are safe. I'll check. In the worst case, we can restore the server from a backup.

    1 Reply Last reply
    • George KG Offline
      George KG Offline
      George K
      wrote on last edited by George K
      #2

      Sounds like a real BFD.

      I don't understand 90% of it, however.

      Basically, there's a flaw in Java (is that still a thing?) that allows anyone to insert malware into a server and use it for nefarious purposes?

      ETA: Apple has patched.

      https://www.macworld.com/article/559108/icloud-patch-log4shell-exploit.html

      "Now look here, you Baltic gas passer... " - Mik, 6/14/08

      The saying, "Lite is just one damn thing after another," is a gross understatement. The damn things overlap.

      KlausK 1 Reply Last reply
      • George KG George K

        Sounds like a real BFD.

        I don't understand 90% of it, however.

        Basically, there's a flaw in Java (is that still a thing?) that allows anyone to insert malware into a server and use it for nefarious purposes?

        ETA: Apple has patched.

        https://www.macworld.com/article/559108/icloud-patch-log4shell-exploit.html

        KlausK Offline
        KlausK Offline
        Klaus
        wrote on last edited by
        #3

        @george-k said in I guess I should check our server...:

        Basically, there's a flaw in Java (is that still a thing?) that allows anyone to insert malware into a server and use it for nefarious purposes?

        In all servers which run software that uses log4J. Which is: most Java projects. And it's not just traditional servers. Could also be routers, NAS, gaming consoles, Amazon Echo-like devices, ... .

        It's a field day for hackers.

        1 Reply Last reply
        • AxtremusA Offline
          AxtremusA Offline
          Axtremus
          wrote on last edited by
          #4

          I did some checking, and so far I think our forum software as an application itself is safe from Log4Shell -- that means no random visitors or even registered/logged-in users can exploit Log4Shell just by posting/typing things into our forum software.

          I have not thoroughly checked the rest of our server, so I cannot definitively tell if there may be some other software components running on our server that may be vulnerable to Log4Shell. That said, since TNCR/NodeBB is the only application we expose to the world, knowing that TNCR/NodeBB is not compromised goes a long way towards reassuring ourselves that we are OK with regards to Log4Shell.

          One level down, our hosting management software Cloudron is also OK.

          The only other accesses to our server would be administrative interfaces (server control panel, etc.), but that's the domain of our virtual private server provider and they should be the ones doing the testing/patching (there are limits to what I can do with these administrative interfaces).

          1 Reply Last reply
          • KlausK Offline
            KlausK Offline
            Klaus
            wrote on last edited by
            #5

            There's a "log4j-scan" tool, which I've used to detect any usages of log4j on our server. We seem to be safe.

            8d3d3756-0256-47ea-9df7-ca3893e48ce2-image.png

            1 Reply Last reply
            • MikM Offline
              MikM Offline
              Mik
              wrote on last edited by
              #6

              Thanks, Klaus.

              We are in good hands.

              “I am fond of pigs. Dogs look up to us. Cats look down on us. Pigs treat us as equals.” ~Winston S. Churchill

              1 Reply Last reply
              • George KG Offline
                George KG Offline
                George K
                wrote on last edited by
                #7

                Time to patch the patch.

                "Now look here, you Baltic gas passer... " - Mik, 6/14/08

                The saying, "Lite is just one damn thing after another," is a gross understatement. The damn things overlap.

                1 Reply Last reply
                • George KG Offline
                  George KG Offline
                  George K
                  wrote on last edited by
                  #8

                  This time we fixed if FOR SURE....

                  https://www.bleepingcomputer.com/news/security/log4j-2171-out-now-fixes-new-remote-code-execution-bug/

                  "Now look here, you Baltic gas passer... " - Mik, 6/14/08

                  The saying, "Lite is just one damn thing after another," is a gross understatement. The damn things overlap.

                  1 Reply Last reply
                  Reply
                  • Reply as topic
                  Log in to reply
                  • Oldest to Newest
                  • Newest to Oldest
                  • Most Votes


                  • Login

                  • Don't have an account? Register

                  • Login or register to search.
                  • First post
                    Last post
                  0
                  • Categories
                  • Recent
                  • Tags
                  • Popular
                  • Users
                  • Groups