The Apache Log4j hotpatch package before log4j-cve-2021-44228-hotpatch-1.1-13 didn’t mimic the permissions of the JVM being patched, allowing it to escalate privileges.
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://alas.aws.amazon.com/AL2/ALAS-2021-1732.html | vendor advisory |
https://alas.aws.amazon.com/ALAS-2021-1554.html | vendor advisory |
https://unit42.paloaltonetworks.com/aws-log4shell-hot-patch-vulnerabilities | third party advisory exploit |