OPNsense
  • Home
  • Help
  • Search
  • Login
  • Register

  • OPNsense Forum »
  • English Forums »
  • Intrusion Detection and Prevention »
  • log4j vulnerability detection
« previous next »
  • Print
Pages: [1]

Author Topic: log4j vulnerability detection  (Read 3584 times)

fwRookie

  • Newbie
  • *
  • Posts: 2
  • Karma: 0
    • View Profile
log4j vulnerability detection
« on: December 13, 2021, 08:51:01 am »
It is possible to detect and block the log4j hacking attempts with the OPNSense firewall (or other parts) rules?
I know other firewalls already have rules available to detect and block possible attempts, like https://cloud.google.com/blog/products/identity-security/cloud-armor-waf-rule-to-help-address-apache-log4j-vulnerability

Logged

Space

  • Full Member
  • ***
  • Posts: 105
  • Karma: 6
    • View Profile
Re: log4j vulnerability detection
« Reply #1 on: December 13, 2021, 09:46:11 am »
Hi, I am not sure if this will help at all ... google states:

Quote
The Cloud Armor WAF rules use a variety of techniques to detect attempted obfuscations and bypasses within attempted exploits of CVE-2021-44228.

But there are probably just way to many ways to obfuscate that simple string ... good enough to catch the script kiddies.

Best regards,

    Space
Logged

fwRookie

  • Newbie
  • *
  • Posts: 2
  • Karma: 0
    • View Profile
Re: log4j vulnerability detection
« Reply #2 on: December 13, 2021, 10:11:04 am »
https://rules.emergingthreatspro.com/open/suricata-5.0/
Suricata seems to have updated their rules set to detect this.
Logged

XeroX

  • Jr. Member
  • **
  • Posts: 85
  • Karma: 5
    • View Profile
Re: log4j vulnerability detection
« Reply #3 on: December 13, 2021, 04:06:43 pm »
Snort Rules in server-web and server-other detect Log4j aswell. As long as traffic is not end to end encrypted.

https://www.snort.org/advisories/talos-rules-2021-12-11

« Last Edit: December 13, 2021, 04:08:49 pm by XeroX »
Logged

Julien

  • Hero Member
  • *****
  • Posts: 647
  • Karma: 32
    • View Profile
Re: log4j vulnerability detection
« Reply #4 on: December 14, 2021, 03:12:44 pm »
Quote from: XeroX on December 13, 2021, 04:06:43 pm
Snort Rules in server-web and server-other detect Log4j aswell. As long as traffic is not end to end encrypted.

https://www.snort.org/advisories/talos-rules-2021-12-11

are you using Snort on Opns? i am having issues with Suricata.
Logged
An intelligent man is sometimes forced to be drunk to spend time with his fool.

fabian

  • Hero Member
  • *****
  • Posts: 2740
  • Karma: 195
  • OPNsense Contributor (Language, VPN, Proxy, etc.)
    • View Profile
    • Personal Homepage
Re: log4j vulnerability detection
« Reply #5 on: December 14, 2021, 07:09:52 pm »
nginx has naxsi which may be used for blocking as well.
Logged

XeroX

  • Jr. Member
  • **
  • Posts: 85
  • Karma: 5
    • View Profile
Re: log4j vulnerability detection
« Reply #6 on: December 17, 2021, 01:27:40 am »
Quote from: Julien on December 14, 2021, 03:12:44 pm
Quote from: XeroX on December 13, 2021, 04:06:43 pm
Snort Rules in server-web and server-other detect Log4j aswell. As long as traffic is not end to end encrypted.

https://www.snort.org/advisories/talos-rules-2021-12-11

are you using Snort on Opns? i am having issues with Suricata.

No I'm using suricata with additional Snort Rules. Use 29190. Don't use 3.x rules.
Logged

dennis_u

  • Newbie
  • *
  • Posts: 10
  • Karma: 0
    • View Profile
    • DU Consult
Re: log4j vulnerability detection
« Reply #7 on: December 19, 2021, 11:59:49 am »
Quote from: fwRookie on December 13, 2021, 08:51:01 am
It is possible to detect and block the log4j hacking attempts with the OPNSense firewall (or other parts) rules?

Yes, it does. It even blocks my internal researches about the vulnerability (e.g. internal requests based und CSRF). Update your ET rules and test it.

But a more general question from my side: our OPNsense even blocks the "IPS blocks Log4Shell" logs to our SIEM, since they match the Log4shell patterns:

Code: [Select]
[Drop] [1:2034672:1] ET EXPLOIT Apache log4j RCE Attempt - 2021/12/12 Obfuscation Observed M1 (CVE-2021-44228) [Classification: Attempted Administrator Privilege Gain] [Priority: 1] {UDP} 10.10.x.1:51488 -> 10.10.x.69:516
The interface 10.10.x.1 points to valuable IT assets and I do not want to disable IPS here. Can I whitelist the OPNsense from IPS?
« Last Edit: December 19, 2021, 12:37:49 pm by dennis_u »
Logged
OPNsense consulting, installation, configuration and care by DU Consult

koushun

  • Jr. Member
  • **
  • Posts: 86
  • Karma: 4
  • Digital pimp hard at work.
    • View Profile
Re: log4j vulnerability detection
« Reply #8 on: January 19, 2022, 12:04:52 am »
What dennis_u said!  :) Having the same issue.
Logged
GA-J3455N-D3H (rev. 1.0)

Julien

  • Hero Member
  • *****
  • Posts: 647
  • Karma: 32
    • View Profile
Re: log4j vulnerability detection
« Reply #9 on: January 23, 2022, 04:41:55 pm »
Quote from: XeroX on December 17, 2021, 01:27:40 am
Quote from: Julien on December 14, 2021, 03:12:44 pm
Quote from: XeroX on December 13, 2021, 04:06:43 pm
Snort Rules in server-web and server-other detect Log4j aswell. As long as traffic is not end to end encrypted.

https://www.snort.org/advisories/talos-rules-2021-12-11

are you using Snort on Opns? i am having issues with Suricata.
3.x rules what are those?

Thank you

No I'm using suricata with additional Snort Rules. Use 29190. Don't use 3.x rules.
Logged
An intelligent man is sometimes forced to be drunk to spend time with his fool.

  • Print
Pages: [1]
« previous next »
  • OPNsense Forum »
  • English Forums »
  • Intrusion Detection and Prevention »
  • log4j vulnerability detection
 

OPNsense is an OSS project © Deciso B.V. 2015 - 2022 All rights reserved
  • SMF 2.0.18 | SMF © 2021, Simple Machines
    Privacy Policy
    | XHTML | RSS | WAP2