On my end? No. On their end they know the ip, they know they have the code, and how to serve it back to the affected system.

On Wed, 2021-12-15 at 09:12 -0600, Brad Stone wrote:
On Wed, Dec 15, 2021 at 9:10 AM Kevin Bucknum <Kevin@xxxxxxxxxxxxxxxxxxx<mailto:Kevin@xxxxxxxxxxxxxxxxxxx>>

This is the type of request that I'm seeing against an apache web server.
Not vulnerable in itself, but suppose I'm running a java application under
WAS. Logging either within my application or with WAS using a vulnerable
log4j version.


That will cause the process doing the logging to make a connection to the
server running at and execute the java code that it gets

Wouldn't the attacker need to know not only the IP of the server, hope it
has java code on it, and in the path they use?

Kevin Bucknum

Senior Programmer Analyst


120 Innwood Drive
Covington LA 70433
Local: 985-893-2550<tel:985-893-2550>
Toll Free: 877-893-2550<tel:877-893-2550>


This document and any accompanying this email transmission contain confidential information, belonging to the sender that is legally privileged. This information is intended only for the use of the individual or entity named above. The authorized recipient of this information is prohibited from disclosing this information to any other party and is required to destroy the information after its stated need has been fulfilled. If you are not the intended recipient, or the employee of agent responsible to deliver it to the intended recipient, you are hereby notified that any disclosure, copying, distribution or action taken in reliance on the contents of these documents is STRICTLY PROHIBITED. If you have received this email in error, please notify the sender immediately to arrange for return or destruction of these documents.

As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2022 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.