On my end? No. On their end they know the ip, they know they have the code, and how to serve it back to the affected system.
On Wed, 2021-12-15 at 09:12 -0600, Brad Stone wrote:
On Wed, Dec 15, 2021 at 9:10 AM Kevin Bucknum <Kevin@xxxxxxxxxxxxxxxxxxx<mailto:Kevin@xxxxxxxxxxxxxxxxxxx>>
This is the type of request that I'm seeing against an apache web server.
Not vulnerable in itself, but suppose I'm running a java application under
WAS. Logging either within my application or with WAS using a vulnerable
That will cause the process doing the logging to make a connection to the
server running at 22.214.171.124 and execute the java code that it gets
Wouldn't the attacker need to know not only the IP of the server, hope it
has java code on it, and in the path they use?
Senior Programmer Analyst
MEDDATA / MEDTRON
120 Innwood Drive
Covington LA 70433
Toll Free: 877-893-2550<tel:877-893-2550>
This document and any accompanying this email transmission contain confidential information, belonging to the sender that is legally privileged. This information is intended only for the use of the individual or entity named above. The authorized recipient of this information is prohibited from disclosing this information to any other party and is required to destroy the information after its stated need has been fulfilled. If you are not the intended recipient, or the employee of agent responsible to deliver it to the intended recipient, you are hereby notified that any disclosure, copying, distribution or action taken in reliance on the contents of these documents is STRICTLY PROHIBITED. If you have received this email in error, please notify the sender immediately to arrange for return or destruction of these documents.
As an Amazon Associate we earn from qualifying purchases.