Log4j 2 Vulnerability: Identifying and Minimizing Production Risk
Dynatrace
DECEMBER 12, 2021
The National Vulnerability Database describes the exploit here. In summary, the Log4Shell exploit allows an attacker to instruct the vulnerable system to download, and subsequently execute, a malicious command. Sensitive Data Access – Do the vulnerable Java processes access critical databases or file systems in the environment?
Let's personalize your content