← Incident Index
CivilizationalOpen Source Infrastructure·December 9, 2021Draft

Apache Software Foundation (Log4j): CVE-2021-44228 — JNDI injection in Log4j enables remote code execution

A JNDI lookup feature in the widely-used Apache Log4j Java logging library allowed attackers to trigger arbitrary remote code execution by crafting log messages containing JNDI lookup strings.

Velocity Governance perspective· Sentinel-10 overlap: 2 of 3

2 of the 3 practices that failed in this incident are part of the Sentinel-10 — the engineering protocols Concordance flags as most degraded under AI-accelerated development.

This incident pre-dates today's AI-velocity surge. The thesis is that the same practices that failed here will fail faster under AI velocity if not actively governed. Read the Velocity Governance thesis →

Impact

CISA Emergency Directive 22-02; FTC warning; UK NCSC advisory
Regulatory action

Log4j was used in millions of Java applications including products from Apple, Amazon, Cloudflare, IBM, Microsoft, and most enterprise Java systems. CISA called it "the most serious vulnerability I have seen in my decades-long career."

Root cause (from published RCA)

Log4j 2.x supports lookups that perform JNDI substitution by default. When user-controlled data is logged, attackers can inject JNDI lookups that cause the logger to fetch and execute remote code from attacker-controlled LDAP/RMI servers. The dangerous behaviour was enabled by default with no documented warning.

Concordance protocols that map to this root cause

Click any protocol to see every other indexed incident where it failed.

Protocol 1.3Ticket Description Quality· Requirementssee all incidents →
Secure-default configuration: JNDI lookups were enabled by default in a logging library — a feature that should have been opt-in for security-relevant context.
Protocol 4.6Security Analysis· TestingSENTINELsee all incidents →
Security analysis did not flag the JNDI-injection pattern despite it being a recognised dangerous-substitution class.
Protocol 2.6Dependency Management· DesignSENTINELsee all incidents →
Downstream dependency management: thousands of Java projects pinned vulnerable Log4j versions transitively without visibility.

Primary sources

Apache Log4j Security Vulnerabilities
Apache Software Foundation · December 10, 2021
CVE-2021-44228
NIST NVD · December 10, 2021
CISA: Apache Log4j Vulnerability Guidance
CISA · December 10, 2021

Related incidents

Other incidents that failed at least one of the same protocols.

Progress Software (MOVEit)May 2023
CVE-2023-34362 SQL injection in MOVEit Transfer leads to mass data the…
SolarWindsDec 2020
SUNBURST malware injected into Orion build pipeline compromises 18,000…
OpenSSL ProjectApr 2014
CVE-2014-0160 — Heartbleed buffer over-read in OpenSSL TLS heartbeat
#cve#rce#logging#java#transitive-dependency#open-source
Check your repo against these protocols.
Concordance scores any public GitHub repo against all 50 engineering protocols in 60 seconds. No signup, no install.
Run a free scan →
Concordance Incident Index entry · CC BY 4.0 · Methodology · Errata: hello@concordancelabs.com