Log4j 2 Vulnerability: Identifying and Minimizing Production Risk
Dynatrace
DECEMBER 12, 2021
This means that an attacker with control over a string that gets passed to the log4j 2 logger can trick the application into requesting a resource from a server under the attacker’s control, then load it, and then execute it. Sensitive Data Access – Do the vulnerable Java processes access critical databases or file systems in the environment?
Let's personalize your content