<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>CVSS &#8211; 21點情報網</title>
	<atom:link href="https://ailog.tw/lifelog/tag/cvss/feed/" rel="self" type="application/rss+xml" />
	<link>https://ailog.tw/lifelog</link>
	<description></description>
	<lastBuildDate>Wed, 15 Dec 2021 01:33:15 +0000</lastBuildDate>
	<language>zh-TW</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>CVSS 3.0評定滿分的CVE-2021-44228漏洞</title>
		<link>https://ailog.tw/lifelog/2021/12/14/cve-2021-44228/</link>
		
		<dc:creator><![CDATA[blackjack]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 14:42:51 +0000</pubDate>
				<category><![CDATA[3C資訊]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[apache]]></category>
		<category><![CDATA[CVE-2021-44228]]></category>
		<category><![CDATA[CVSS]]></category>
		<category><![CDATA[CVSS 3.0評定滿分的CVE-2021-44228漏洞]]></category>
		<category><![CDATA[log4j]]></category>
		<guid isPermaLink="false">https://ailog.tw/lifelog/?p=12167</guid>

					<description><![CDATA[Apache於2021年12月份發布了Log4j 2.15.0的修補版本，該版本修補了CVE-2021-442 &#8230; <p class="link-more"><a href="https://ailog.tw/lifelog/2021/12/14/cve-2021-44228/" class="more-link">閱讀全文<span class="screen-reader-text">〈CVSS 3.0評定滿分的CVE-2021-44228漏洞〉</span></a></p>]]></description>
										<content:encoded><![CDATA[<p><span style="font-size: 14pt; font-family: verdana, geneva;">Apache於2021年12月份發布了Log4j 2.15.0的修補版本，該版本修補了CVE-2021-44228漏洞，該漏洞會被評定為最高等級原因是該套件被應用的很廣泛，所多知名廠商都被影響到。<span id="more-12167"></span>漏洞流程說明：</span><br />
<span style="font-size: 14pt; font-family: verdana, geneva;"><img decoding="async" src="https://www.fortinet.com/blog/psirt-blogs/apache-log4j-vulnerability/_jcr_content/root/responsivegrid/image.img.png/1639460358616/log4j-01.png" alt="Log4j 漏洞圖" /></span><br />
<span style="font-size: 10pt; font-family: verdana, geneva;">圖片來自fortinet官方網頁：<a href="https://www.fortinet.com/blog/psirt-blogs/apache-log4j-vulnerability">https://www.fortinet.com/blog/psirt-blogs/apache-log4j-vulnerability</a></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">Juniper 官方Blog有更詳細的攻擊過程說明：</span><br />
<span style="font-size: 12pt; font-family: verdana, geneva;"><a href="https://blogs.juniper.net/en-us/security/apache-log4j-vulnerability-cve-2021-44228-raises-widespread-concerns">https://blogs.juniper.net/en-us/security/apache-log4j-vulnerability-cve-2021-44228-raises-widespread-concerns</a></span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">漏洞影響程度：<br />
攻擊者透過Log4j的漏洞，將可以控制LDAP與其他JNDI有關的端點。</span></p>
<p><span style="font-size: 14pt; font-family: verdana, geneva;">漏洞評分：<br />
</span>為10分，被評定最高危險等級。</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
