{"id":47666,"date":"2023-03-02T07:15:12","date_gmt":"2023-03-02T07:15:12","guid":{"rendered":"https:\/\/www.dynatrace.com\/news\/?p=47666"},"modified":"2024-04-25T15:06:05","modified_gmt":"2024-04-25T15:06:05","slug":"what-is-log4shell","status":"publish","type":"post","link":"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/","title":{"rendered":"What is Log4Shell? The Log4j vulnerability explained (and what to do about it)"},"content":{"rendered":"<p>Since December 10<sup>th<\/sup>, 2021, days after industry experts discovered a critical vulnerability known as <strong>Log4Shell<\/strong> in servers supporting the game Minecraft, bad actors have made millions of exploit attempts of the <strong>Log4j 2 Java library<\/strong>, according to one team tracking the impact. The vulnerability is a potential threat to millions more applications and devices across the globe.<\/p>\n<p>In this article, we\u2019ll answer some frequently asked questions about the <strong>Log4j vulnerability<\/strong>. We will continue to add more answers as new questions come up.<\/p>\n<h2 id=\"what-is-log4shell\">What is Log4Shell?<\/h2>\n<p>Log4Shell is a software vulnerability in <a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/\" target=\"_blank\" rel=\"noopener\">Apache Log4j 2<\/a>, a popular Java library for logging error messages in applications. The vulnerability, published as <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228\" target=\"_blank\" rel=\"noopener\">CVE-2021-44228<\/a>, enables a remote attacker to take control of a device on the internet if the device is running certain versions of Log4j 2.<\/p>\n<p><a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html#cve-2021-44228\" target=\"_blank\" rel=\"noopener\">Apache issued a patch<\/a> for CVE-2021-44228, version 2.15, on December 6, 2021. However, this patch left part of the vulnerability unfixed, resulting in <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-45046\" target=\"_blank\" rel=\"noopener\">CVE-2021-45046<\/a> and a second patch, version 2.16, released on December 13. Apache released a third patch, version 2.17, on December 17 to fix another related vulnerability, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-45105\" target=\"_blank\" rel=\"noopener\">CVE-2021-45105<\/a>. They released a fourth patch, 2.17.1, on December 28 to address another vulnerability, <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44832\" target=\"_blank\" rel=\"noopener\">CVE-2021-44832<\/a>.<\/p>\n<p>Attackers can exploit the vulnerability using text messages to control a computer remotely. The Apache Software Foundation, which publishes the Log4j 2 library, gave the vulnerability a <a href=\"https:\/\/nvd.nist.gov\/vuln-metrics\/cvss\" target=\"_blank\" rel=\"noopener\">CVSS score<\/a> of 10 out of 10, the highest-level severity score, because of its potential for widespread exploitation and the ease with which malicious attackers can exploit it. While mitigation evolves and the damage unfolds, the fundamentals of the Log4j vulnerability won\u2019t change.<\/p>\n<section class='cta cta--theme--dark'><div class='cta__content'>\n<p>Check out this session from Perform 2023 conference &#8220;Does your CISO know the organizational exposure to the next Log4Shell?&#8221;<\/p>\n<div class='cta__buttons'><a class='btn btn--primary btn--primary--light' href='\/perform\/on-demand\/perform-2023\/?session=does-your-ciso-know-the-organizational-exposure-to-the-next-log4shell'>Watch now!<\/a><\/div><\/div><\/section>\n<h2 id=\"when-did-experts-discover-the-original-vulnerability-in-the-log4j-2-library\">When did experts discover the original vulnerability in the Log4j 2 library?<\/h2>\n<p>Security researcher Chen Zhaojun of Alibaba, China\u2019s largest e-commerce company, first reported the vulnerability to the Apache Foundation (an open-source project) on November 24. They discovered the attack December 9 on servers that host the game Minecraft. After further forensic analysis, they realized cybercriminals discovered the gap earlier, and have exploited it since at least December 1, 2021.<\/p>\n<h2 id=\"whats-the-risk-from-the-log4shell-vulnerability-in-the-log4j-2-library\">What\u2019s the risk from the Log4Shell vulnerability in the Log4j 2 library?<\/h2>\n<p>Log4Shell is considered a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Zero-day_(computing)\" target=\"_blank\" rel=\"noopener\">zero-day vulnerability<\/a> because malicious actors likely knew about and exploited it before experts did.<\/p>\n<p>What makes the log4j vulnerability so dangerous is how ubiquitous the Log4j 2 library is. It\u2019s present in major platforms from Amazon Web Services to VMware, and services large and small. The web of dependencies among affected platforms and services means patching can be a complex and possibly time-consuming process.<\/p>\n<p>In particular, it&#8217;s the ease of exploiting the vulnerability that compounds its impact. The Log4j 2 library controls how applications log strings of code and information. The vulnerability enables an attacker to gain control over a string and trick the application into requesting and executing malicious code under the attacker\u2019s control. As a result, attackers can remotely take over any internet-connected service that uses certain versions of the Log4j library anywhere in the software stack.<\/p>\n<h2 id=\"what-is-log4j-2-and-what-does-it-do\">What is Log4j 2, and what does it do?<\/h2>\n<p>As the most widely used logging framework on the internet, organizations across the industry have integrated Apache Log4j 2 into myriad applications. This includes major cloud services such as Apple, Google, Microsoft, and Cloudflare, as well as platforms like Twitter and Stream.<\/p>\n<p>Log4j 2 logs messages from software and searches for errors afterward. The data range is broad, from basic browser and web page information to technical details about the system Log4j 2 runs on.<\/p>\n<p>Not only can the Log4j 2 library create simple logs, but it can also execute commands to generate advanced logging information. In doing so, it can also communicate with other sources, such as internal directory services.<\/p>\n<figure><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-63811\" src=\"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2023\/03\/Blog_-OTP-0118_-high-res-version-1-300x169.png\" alt=\"Log4j vulnerability\" width=\"300\" height=\"169\" srcset=\"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2023\/03\/Blog_-OTP-0118_-high-res-version-1-300x169.png 300w, https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2023\/03\/Blog_-OTP-0118_-high-res-version-1-1024x576.png 1024w, https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2023\/03\/Blog_-OTP-0118_-high-res-version-1-768x432.png 768w, https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2023\/03\/Blog_-OTP-0118_-high-res-version-1-1536x864.png 1536w, https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2023\/03\/Blog_-OTP-0118_-high-res-version-1-200x113.png 200w, https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2023\/03\/Blog_-OTP-0118_-high-res-version-1-400x225.png 400w, https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2023\/03\/Blog_-OTP-0118_-high-res-version-1-600x338.png 600w, https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2023\/03\/Blog_-OTP-0118_-high-res-version-1-800x450.png 800w, https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2023\/03\/Blog_-OTP-0118_-high-res-version-1-1000x563.png 1000w, https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2023\/03\/Blog_-OTP-0118_-high-res-version-1-1200x675.png 1200w, https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2023\/03\/Blog_-OTP-0118_-high-res-version-1-1400x788.png 1400w, https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2023\/03\/Blog_-OTP-0118_-high-res-version-1.png 1600w\" sizes=\"auto, (min-width: 900px) 900px, 100vw\" \/><figcaption>Log4j vulnerability<\/figcaption><\/figure>\n<h2 id=\"how-does-the-log4shell-vulnerability-cause-damage\">How does the Log4Shell vulnerability cause damage?<\/h2>\n<p>Because the Log4j 2 library can communicate with other sources and internal directory services, attackers can easily feed Log4j 2 with malicious commands from the outside and make it download and execute dangerous code from malicious sources.<\/p>\n<p>How attackers can exploit Log4j 2 depends on the specifics of the affected system. So far, the vast majority of malicious activity has been mass scanning to fingerprint vulnerable systems. Attackers have been exploiting the vulnerability to compromise virtualization infrastructure, install and execute ransomware, steal system credentials, take broad control of compromised networks, and exfiltrate data, according to a <a href=\"https:\/\/www.microsoft.com\/security\/blog\/2021\/12\/11\/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation\/\" target=\"_blank\" rel=\"noopener\">Microsoft report<\/a>.<\/p>\n<p>As reports continue to mount regarding the exploitability of Log4Shell, the possibilities for malicious activity seem exponential. Malicious actors can execute any code on the attacked system, for example, to access sensitive configuration data. In capturing this data, attackers could gain full control of a system \u2014 and all its data and applications. This is like a burglar who has keys to the front door and the combination to the safe inside.<\/p>\n<h2 id=\"what-are-the-vulnerabilities-published-so-far\">What are the vulnerabilities published so far?<\/h2>\n<p>CVE has published four vulnerabilities related to Log4Shell:<\/p>\n<table style=\"font-weight: 400;\" data-tablestyle=\"MsoTableGrid\" data-tablelook=\"1696\" aria-rowcount=\"5\">\n<tbody>\n<tr aria-rowindex=\"1\">\n<td data-celllook=\"0\"><strong>Vulnerability<\/strong><\/td>\n<td data-celllook=\"0\"><strong>What&#8217;s vulnerable<\/strong><\/td>\n<td data-celllook=\"0\"><strong>Log4j 2 patch<\/strong><\/td>\n<\/tr>\n<tr aria-rowindex=\"2\">\n<td style=\"vertical-align: top;\" data-celllook=\"0\"><span data-contrast=\"auto\"><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44832\" target=\"_blank\" rel=\"noopener\">CVE-2021-44832<\/a> (latest)<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">An attacker with <\/span><span data-contrast=\"none\">control of the target LDAP server could launch<\/span><span data-contrast=\"none\"> a remote code execution (RCE) attack when a configuration uses a JDBC <\/span><span data-contrast=\"none\">Appender<\/span><span data-contrast=\"none\"> with a JNDI LDAP data source URI<\/span><span data-contrast=\"none\">.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">Log4j 2.17.1 for Java 8 and up. <\/span><\/p>\n<p><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">This is the latest patch.\u00a0\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"3\">\n<td style=\"vertical-align: top;\" data-celllook=\"0\"><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-45105\"><span data-contrast=\"none\">CVE-2021-45105<\/span><\/a><span data-contrast=\"none\"> (third)<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">Left the door open for an attacker to initiate a denial-of-service attack by causing an infinite recursion loop on self-referential lookups.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">Log4j 2.17.0 for Java 8 and up.\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"4\">\n<td style=\"vertical-align: top;\" data-celllook=\"0\"><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-45046\"><span data-contrast=\"none\">CVE-2021-45046<\/span><\/a><span data-contrast=\"none\"> (second)<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">Made it possible for attackers to craft malicious input data that could cause an information leak or remote code execution.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">Log4j 2.12.2 for Java 7 and 2.16.0 for Java 8 and up<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<tr aria-rowindex=\"5\">\n<td style=\"vertical-align: top;\" data-celllook=\"0\"><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228\"><span data-contrast=\"none\">CVE-2021-44228<\/span><\/a><span data-contrast=\"none\"> (original)<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">Possible for an attacker to execute random code using the message lookup functionality.<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<td data-celllook=\"0\"><span data-contrast=\"none\">Log4j 2.12.2 and Log4j 2.16.0<\/span><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\">\u00a0<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>To ensure systems that use Log4j 2 are protected against these vulnerabilities, IT teams should apply the latest patch, Log4j 2.17.0 for Java 8 and up.<\/p>\n<h2 id=\"how-does-log4shell-affect-consumers\">How does Log4Shell affect consumers?<\/h2>\n<p>Many companies and organizations use the Log4j library in numerous applications and infrastructure, either directly, or through third-party use. In the consumer sector, much network-enabled storage and smart home equipment also use the Log4j 2 library. Users should disconnect them from the Internet until their manufacturers make updates available.<\/p>\n<p>Most companies have placed a corresponding security message on their websites describing what they are doing about the Log4j vulnerability.<\/p>\n<p>Consumers should install software updates provided by the vendors they use. They should also try to find out whether Log4Shell affects the organizations that host the sites and services they use. If so, they should find out what measures the organizations are taking to safeguard their personal information.<\/p>\n<h2 id=\"what-should-it-security-teams-do-about-the-log4shell-vulnerability\">What should IT security teams do about the Log4Shell vulnerability?<\/h2>\n<p>Organizations that use Log4j 2 in their own applications and infrastructure should update them immediately. The same applies to third-party applications. The <a href=\"https:\/\/logging.apache.org\/log4j\/2.x\/security.html#cve-2021-45105\" target=\"_blank\" rel=\"noopener\">version 2.17.0 release<\/a> fully secures the library against the Log4Shell vulnerability.<\/p>\n<p>Because Log4Shell affects so many systems and is so easy to exploit, organizations must act swiftly to protect their systems. To quickly identify affected systems, organizations need a solution like <a href=\"\/platform\/application-security\/\">Dynatrace Application Security<\/a> that can immediately and automatically identify vulnerable systems and their dependencies, and help you prioritize the most critical systems to update first, especially on code running in production.<\/p>\n<p>As Log4Shell continues to threaten companies\u2019 applications and sensitive data, Dynatrace Application Security enables organizations to gain real-time insight into which assets the vulnerability affects at run-time, and which are the highest priority, while also monitoring the whole multicloud environment. This helps you maintain real-time awareness of malicious activity as you address the impact of the Log4Shell vulnerability.<\/p>\n<p>To learn more about how the Log4Shell vulnerability works and how to mitigate it, check out the following resources:<\/p>\n<ul>\n<li><a href=\"\/news\/blog\/log4shell-vulnerability\/\">Log4Shell: Identifying and minimizing production risk<\/a> blog<\/li>\n<li><a href=\"\/news\/security-alert\/log4shell-log4j-vulnerability\/\">Log4j vulnerability (Log4Shell) Dynatrace security alert<\/a><\/li>\n<li><a href=\"https:\/\/info.dynatrace.com\/global-all-wc-dynatrace-for-log4shell-18339-od-fulfillment.html\">Log4Shell vulnerability: Identifying and minimizing production risk<\/a> webinar<\/li>\n<li><a href=\"\/news\/blog\/log4shell-vulnerability-discovery-and-mitigation\/\">Log4Shell vulnerability discovery and mitigation require automatic and intelligent observability<\/a> blog<\/li>\n<li><a href=\"\/resource-center\/log4j-vulnerability\">Dynatrace Log4Shell resource center<\/a> webpage<\/li>\n<\/ul>\n<p>Also, check back on this FAQ blog for frequent updates.<\/p>\n<p><script type=\"application\/ld+json\">\n{\n  \"@context\": \"https:\/\/schema.org\",\n  \"@type\": \"FAQPage\",\n  \"mainEntity\": [\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What is Log4Shell?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Log4Shell is a software vulnerability in Apache Log4j 2, a popular Java library for logging error messages in applications. The vulnerability, published as CVE-2021-44228, enables a remote attacker to take control of a device on the internet, if the device is running certain versions of Log4j 2.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What is Log4j?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Apache Log4j 2 is a popular Java library for logging error messages in applications. It is part of the Apache Logging Services, a project of the Apache Software Foundation.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"When was the vulnerability in the Log4j 2 library discovered?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"The vulnerability was first reported to the Apache Foundation (an open-source project) on November 24 by security researcher Chen Zhaojun of Alibaba, China\u2019s largest e-commerce company, after an attack was documented on December 9 and affected servers of the game Minecraft. Further forensic analysis revealed that cybercriminals discovered the gap earlier, and it has been exploited since at least December 1.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What\u2019s the risk from the Log4Shell vulnerability in the Log4j 2 library?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Log4Shell is considered a zero-day vulnerability because malicious actors likely knew about and exploited it before experts did. What makes Log4Shell so dangerous is how ubiquitous the Log4j 2 library is. It\u2019s present in major platforms from Amazon Web Services to VMware, and services large and small. The web of dependencies among affected platforms and services means patching can be a complex and possibly time-consuming process.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What does Log4j 2?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"As the most widely used logging framework on the internet, Apache Log4j 2 is integrated into myriad applications, used on major cloud services such as Apple, Google, Microsoft and Cloudflare, as well as platforms like Twitter and Stream. It logs messages from software, and searches for errors afterwards. The amount of recordable data is broad, and ranges from basic user browser and web page information to detailed technical information about the system Log4j 2 is running on.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"How does the vulnerability Log4Shell cause damage?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Because the Log4j 2 library can communicate with other sources and internal directory services, attackers can easily feed Log4j 2 with malicious commands from the outside and make it download and execute dangerous code from malicious sources.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"How does Log4Shell affect consumers?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"The Log4j 2 library is often used in many applications in the infrastructure environment of companies and organizations. In the consumer sector, Log4j 2 can also be found in network-enabled storage and smart home equipment, which users should disconnect from the Internet until updates are available.\"\n      }\n    },\n    {\n      \"@type\": \"Question\",\n      \"name\": \"What should IT security teams do about the Log4Shell vulnerability?\",\n      \"acceptedAnswer\": {\n        \"@type\": \"Answer\",\n        \"text\": \"Organizations that use Log4j 2 in their own applications and infrastructure should update them immediately. The same applies to third-party applications. The version 2.16.0 release fully secures the library against the Log4Shell vulnerability. Because there are so many systems likely affected by Log4Shell and it\u2019s so easy to exploit, organizations must act swiftly to protect their interests and users. To quickly identify affected systems, organizations need a solution like Dynatrace Application Security that can immediately and automatically identify vulnerable systems and their dependencies, and help you prioritize the most critical systems to update first, especially on code running in production.\"\n      }\n    }\n  ]\n}\n<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since December 10th, 2021, days after industry experts discovered a critical vulnerability known as Log4Shell in servers supporting the game Minecraft, bad actors have made millions of exploit attempts of the Log4j 2 Java library, according to one team tracking the impact. The vulnerability is a potential threat to millions more applications and devices across [&hellip;]<\/p>\n","protected":false},"author":381,"featured_media":47776,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[25209],"tags":[25315,25166,25312,25313],"coauthors":[25622],"class_list":["post-47666","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-application-security","tag-apache-log4j-2","tag-application-security","tag-log4j-vulnerability","tag-log4shell"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Log4j vulnerability explained: What is Log4Shell? | Dynatrace news<\/title>\n<meta name=\"description\" content=\"The Log4j vulnerabilities have triggered millions of exploit attempts of the Log4j 2 library. Learn all you need to know about Log4Shell.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Log4Shell? The Log4j vulnerability explained (and what to do about it)\" \/>\n<meta property=\"og:description\" content=\"The Log4j vulnerabilities have triggered millions of exploit attempts of the Log4j 2 library. Learn all you need to know about Log4Shell.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/\" \/>\n<meta property=\"og:site_name\" content=\"Dynatrace news\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Dynatrace\/\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dt-cdn.net\/wp-content\/uploads\/2021\/12\/15403_RC_Log4Shell_800x450_FINAL-2-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Andreas Berger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Dynatrace\" \/>\n<meta name=\"twitter:site\" content=\"@Dynatrace\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andreas Berger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/\"},\"author\":{\"name\":\"Andreas Berger\",\"@id\":\"https:\/\/www.dynatrace.com\/news\/#\/schema\/person\/7b3d04a5e03ee3c844193fdc55069a5f\"},\"headline\":\"What is Log4Shell? The Log4j vulnerability explained (and what to do about it)\",\"datePublished\":\"2024-04-25T15:06:05+00:00\",\"dateModified\":\"2024-04-25T15:06:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/\"},\"wordCount\":1391,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.dynatrace.com\/news\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2021\/12\/15403_RC_Log4Shell_800x450_FINAL-2-1.png\",\"keywords\":[\"Apache Log4j 2\",\"Application Security\",\"Log4j vulnerability\",\"Log4Shell\"],\"articleSection\":[\"Application security\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/\",\"url\":\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/\",\"name\":\"Log4j vulnerability explained: What is Log4Shell? | Dynatrace news\",\"isPartOf\":{\"@id\":\"https:\/\/www.dynatrace.com\/news\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2021\/12\/15403_RC_Log4Shell_800x450_FINAL-2-1.png\",\"datePublished\":\"2023-03-02T07:15:12+00:00\",\"dateModified\":\"2024-04-25T15:06:05+00:00\",\"description\":\"The Log4j vulnerabilities have triggered millions of exploit attempts of the Log4j 2 library. Learn all you need to know about Log4Shell.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#primaryimage\",\"url\":\"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2021\/12\/15403_RC_Log4Shell_800x450_FINAL-2-1.png\",\"contentUrl\":\"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2021\/12\/15403_RC_Log4Shell_800x450_FINAL-2-1.png\",\"width\":800,\"height\":450,\"caption\":\"Log4J Vulnerability, What is Log4Shell\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.dynatrace.com\/news\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Log4Shell? The Log4j vulnerability explained (and what to do about it)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dynatrace.com\/news\/#website\",\"url\":\"https:\/\/www.dynatrace.com\/news\/\",\"name\":\"Dynatrace news\",\"description\":\"The tech industry is moving fast and our customers are as well. Stay up-to-date with the latest trends, best practices, thought leadership, and our solution&#039;s biweekly feature releases.\",\"publisher\":{\"@id\":\"https:\/\/www.dynatrace.com\/news\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dynatrace.com\/news\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.dynatrace.com\/news\/#organization\",\"name\":\"Dynatrace\",\"url\":\"https:\/\/www.dynatrace.com\/news\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.dynatrace.com\/news\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2025\/07\/dynatrace_web.png\",\"contentUrl\":\"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2025\/07\/dynatrace_web.png\",\"width\":717,\"height\":201,\"caption\":\"Dynatrace\"},\"image\":{\"@id\":\"https:\/\/www.dynatrace.com\/news\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Dynatrace\/\",\"https:\/\/x.com\/Dynatrace\",\"https:\/\/www.instagram.com\/dynatrace\/\",\"https:\/\/www.linkedin.com\/company\/dynatrace\",\"https:\/\/www.youtube.com\/c\/dynatrace\",\"https:\/\/en.wikipedia.org\/wiki\/Dynatrace\",\"https:\/\/www.glassdoor.com\/Overview\/Working-at-Dynatrace-EI_IE309684.1120.htm\"],\"description\":\"Dynatrace is advancing observability for today\u2019s digital businesses, helping to transform the complexity of modern digital ecosystems into powerful business assets. By leveraging AI-powered insights, Dynatrace enables organizations to analyze, automate, and innovate faster to drive their business forward.\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dynatrace.com\/news\/#\/schema\/person\/7b3d04a5e03ee3c844193fdc55069a5f\",\"name\":\"Andreas Berger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/www.dynatrace.com\/news\/#\/schema\/person\/image\/eba3885040b1f8548d8321eea9c09910\",\"url\":\"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2020\/12\/Berger-1-150x150.png\",\"contentUrl\":\"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2020\/12\/Berger-1-150x150.png\",\"caption\":\"Andreas Berger\"},\"description\":\"Andreas Berger is the Lead Product Engineer for Dynatrace Application Security. Andreas is determined to solve the challenges of building large-scale security monitoring systems, which typically accept too many false positives and offer poor user experience. In his free time, Andreas ponders new security approaches and other tech challenges while running or riding his mountain bike in the hills of Upper Austria.\",\"url\":\"https:\/\/www.dynatrace.com\/news\/blog\/author\/andreas-berger\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Log4j vulnerability explained: What is Log4Shell? | Dynatrace news","description":"The Log4j vulnerabilities have triggered millions of exploit attempts of the Log4j 2 library. Learn all you need to know about Log4Shell.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/","og_locale":"en_US","og_type":"article","og_title":"What is Log4Shell? The Log4j vulnerability explained (and what to do about it)","og_description":"The Log4j vulnerabilities have triggered millions of exploit attempts of the Log4j 2 library. Learn all you need to know about Log4Shell.","og_url":"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/","og_site_name":"Dynatrace news","article_publisher":"https:\/\/www.facebook.com\/Dynatrace\/","og_image":[{"width":800,"height":450,"url":"https:\/\/dt-cdn.net\/wp-content\/uploads\/2021\/12\/15403_RC_Log4Shell_800x450_FINAL-2-1.png","type":"image\/png"}],"author":"Andreas Berger","twitter_card":"summary_large_image","twitter_creator":"@Dynatrace","twitter_site":"@Dynatrace","twitter_misc":{"Written by":"Andreas Berger","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#article","isPartOf":{"@id":"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/"},"author":{"name":"Andreas Berger","@id":"https:\/\/www.dynatrace.com\/news\/#\/schema\/person\/7b3d04a5e03ee3c844193fdc55069a5f"},"headline":"What is Log4Shell? The Log4j vulnerability explained (and what to do about it)","datePublished":"2024-04-25T15:06:05+00:00","dateModified":"2024-04-25T15:06:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/"},"wordCount":1391,"commentCount":0,"publisher":{"@id":"https:\/\/www.dynatrace.com\/news\/#organization"},"image":{"@id":"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#primaryimage"},"thumbnailUrl":"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2021\/12\/15403_RC_Log4Shell_800x450_FINAL-2-1.png","keywords":["Apache Log4j 2","Application Security","Log4j vulnerability","Log4Shell"],"articleSection":["Application security"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/","url":"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/","name":"Log4j vulnerability explained: What is Log4Shell? | Dynatrace news","isPartOf":{"@id":"https:\/\/www.dynatrace.com\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#primaryimage"},"image":{"@id":"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#primaryimage"},"thumbnailUrl":"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2021\/12\/15403_RC_Log4Shell_800x450_FINAL-2-1.png","datePublished":"2023-03-02T07:15:12+00:00","dateModified":"2024-04-25T15:06:05+00:00","description":"The Log4j vulnerabilities have triggered millions of exploit attempts of the Log4j 2 library. Learn all you need to know about Log4Shell.","breadcrumb":{"@id":"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#primaryimage","url":"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2021\/12\/15403_RC_Log4Shell_800x450_FINAL-2-1.png","contentUrl":"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2021\/12\/15403_RC_Log4Shell_800x450_FINAL-2-1.png","width":800,"height":450,"caption":"Log4J Vulnerability, What is Log4Shell"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dynatrace.com\/news\/blog\/what-is-log4shell\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dynatrace.com\/news\/"},{"@type":"ListItem","position":2,"name":"What is Log4Shell? The Log4j vulnerability explained (and what to do about it)"}]},{"@type":"WebSite","@id":"https:\/\/www.dynatrace.com\/news\/#website","url":"https:\/\/www.dynatrace.com\/news\/","name":"Dynatrace news","description":"The tech industry is moving fast and our customers are as well. Stay up-to-date with the latest trends, best practices, thought leadership, and our solution&#039;s biweekly feature releases.","publisher":{"@id":"https:\/\/www.dynatrace.com\/news\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dynatrace.com\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/www.dynatrace.com\/news\/#organization","name":"Dynatrace","url":"https:\/\/www.dynatrace.com\/news\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.dynatrace.com\/news\/#\/schema\/logo\/image\/","url":"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2025\/07\/dynatrace_web.png","contentUrl":"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2025\/07\/dynatrace_web.png","width":717,"height":201,"caption":"Dynatrace"},"image":{"@id":"https:\/\/www.dynatrace.com\/news\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Dynatrace\/","https:\/\/x.com\/Dynatrace","https:\/\/www.instagram.com\/dynatrace\/","https:\/\/www.linkedin.com\/company\/dynatrace","https:\/\/www.youtube.com\/c\/dynatrace","https:\/\/en.wikipedia.org\/wiki\/Dynatrace","https:\/\/www.glassdoor.com\/Overview\/Working-at-Dynatrace-EI_IE309684.1120.htm"],"description":"Dynatrace is advancing observability for today\u2019s digital businesses, helping to transform the complexity of modern digital ecosystems into powerful business assets. By leveraging AI-powered insights, Dynatrace enables organizations to analyze, automate, and innovate faster to drive their business forward."},{"@type":"Person","@id":"https:\/\/www.dynatrace.com\/news\/#\/schema\/person\/7b3d04a5e03ee3c844193fdc55069a5f","name":"Andreas Berger","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/www.dynatrace.com\/news\/#\/schema\/person\/image\/eba3885040b1f8548d8321eea9c09910","url":"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2020\/12\/Berger-1-150x150.png","contentUrl":"https:\/\/news.cdn.dm.dynatrace.com\/wp-content\/uploads\/2020\/12\/Berger-1-150x150.png","caption":"Andreas Berger"},"description":"Andreas Berger is the Lead Product Engineer for Dynatrace Application Security. Andreas is determined to solve the challenges of building large-scale security monitoring systems, which typically accept too many false positives and offer poor user experience. In his free time, Andreas ponders new security approaches and other tech challenges while running or riding his mountain bike in the hills of Upper Austria.","url":"https:\/\/www.dynatrace.com\/news\/blog\/author\/andreas-berger\/"}]}},"featured_image_url":"","_links":{"self":[{"href":"https:\/\/www.dynatrace.com\/news\/wp-json\/wp\/v2\/posts\/47666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dynatrace.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dynatrace.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dynatrace.com\/news\/wp-json\/wp\/v2\/users\/381"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dynatrace.com\/news\/wp-json\/wp\/v2\/comments?post=47666"}],"version-history":[{"count":26,"href":"https:\/\/www.dynatrace.com\/news\/wp-json\/wp\/v2\/posts\/47666\/revisions"}],"predecessor-version":[{"id":63812,"href":"https:\/\/www.dynatrace.com\/news\/wp-json\/wp\/v2\/posts\/47666\/revisions\/63812"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dynatrace.com\/news\/wp-json\/wp\/v2\/media\/47776"}],"wp:attachment":[{"href":"https:\/\/www.dynatrace.com\/news\/wp-json\/wp\/v2\/media?parent=47666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dynatrace.com\/news\/wp-json\/wp\/v2\/categories?post=47666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dynatrace.com\/news\/wp-json\/wp\/v2\/tags?post=47666"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.dynatrace.com\/news\/wp-json\/wp\/v2\/coauthors?post=47666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}