On December 9, 2021, a very serious vulnerability in the popular Java-based logging package Log4j was disclosed. This vulnerability allows an attacker to execute code on a remote server; a so-called Remote Code Execution (RCE). As MuleSoft uses the affected Log4j versions it is crucial that you understand the issue, how you test if you are vulnerable, and how to protect your applications. This video will address all three. VIDEO LINKS - Log4Shell Vulnerability Tester: https://log4shell.huntress.com/ - Better technical description: https://blog.cloudflare.com/inside-the-log4j2-vulnerability-cve-2021-44228/ FOLLOW ME ON SOCIAL MEDIA - LinkedIn: https://www.linkedin.com/in/JasonEstevan - Twitter: https://twitter.com/JasonEstevan
(MuleSoft)(Mule)(Integration)(Software Enginerring)(Engineer)(Computer Science)(MuleSoft Meetup)(Developer)(Tutorial)(Boomi)(Log4j)(RCE)(Zero Day)(CVE-2021-44228)(Log4j2)(vulnerability)(Exploit)
ads 728x90
الثلاثاء، 14 ديسمبر 2021
New Log4j Remote Code Execution Vulnerability Affects All MuleSoft Applications
الاشتراك في:
تعليقات الرسالة (Atom)
ليست هناك تعليقات:
إرسال تعليق