As of the time of writing, there is not a comprehensive list of software packages that use Log4j that are affected. Attackers are currently spraying the internet with payloads in the User-Agent that attempt to do a remote injection and generate responses to an attacker controlled LDAP server.
SecurityTrails is advising its customers to monitor all internet-facing Java-based apps and servers. For example, Log4j is present in nearly all enterprise-level Apache products and many open source products including ElasticSearch.
Our friends at Greynoise have observed IPs sending payloads trying to identify and/or exploit this vulnerability. You can get a list of the actors from here (continuously updated). Our team is monitoring honeypot data to identify how attackers are progressing.
The dependencies for Log4j run very deep so the attack surface of exploitable software will be also deep. Github lists 1,844 repositories that have dependencies in Github insights here.
Mitigations: This afternoon, CISA encouraged review of the Apache Log4j 2.15.0 Announcement and upgrade to Log4j 2.15.0 or apply the recommended mitigations immediately.
From the Apache post:
Mitigation: In previous releases (>=2.10) this behavior can be mitigated by setting system property “log4j2.formatMsgNoLookups” to “true” or by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class). Java 8u121 (see https://www.oracle.com/java/technologies/javase/8u121-relnotes.html) protects against RCE by defaulting “com.sun.jndi.rmi.object.trustURLCodebase” and “com.sun.jndi.cosnaming.object.trustURLCodebase” to “false”.
Over the next few days, developers will determine applications that use Apache Log4j that are vulnerable. We’ll post updates here as well as add SecurityTrails ASI detections as information and research becomes available.
Log4j zero-day gets security fix just as scans for vulnerable systems ramp up (The Record)
log4j RCE Exploitation Detection (Github Gist)
Apache Log4j Security Vulnerabilities (apache.org)
TR-65 - Vulnerabilities and Exploitation of Log4j (circl.lu)
Log4Shell: RCE 0-day exploit found in log4j2 (lunasec.io)