Skip to content

Mitigations (AWS WAF, Lambda@Edge/CloudFront Functions) to implement on AWS to attempt to prevent log4j exploitation.

Notifications You must be signed in to change notification settings

OllieJC/aws-log4j-mitigations

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

aws-log4j-mitigations

Mitigations to implement on AWS to attempt to prevent log4j exploitation.

AWS WAF

This is likely the best option to implement as Amazon will be able to keep the rule up-to-date.

Enable AWS-AWSManagedRulesKnownBadInputsRuleSet where Log4JRCE is available in the latest version.

You can find example Terraform to create the rule with just Log4RCE enabled here: aws_waf/rule.tf

Console:

Screenshot of the AWS WAF rule enabled in the AWS Console

CloudFront

If you'd like more control over filtering, suggest using Lambda@Edge and in particular origin requests with body enabled.

The faas_code/index.js attempts to capture bad inputs, it can also find base64 and test it (which systems may parse headers automatically before passing to log4j where it could be exploited).

The main engine of the code is using the following regex: /(?:\$|\%24)(?:\{|\%7b)[^\w]*?j[^\w]*?n[^\w]*?d[^\w]*?i[^\w]*?(?:\:|\%3a)/im;

Lambda@Edge

See cloudfront/lambda@edge/ for example Terraform of implementing the faas_code/index.js as a Lambda@Edge origin request.

CloudFront Functions

See cloudfront/functions/ for example Terraform of implementing the faas_code/index.js as a CloudFront Function viewer request.

Note: CloudFront Functions don't have an option to inspect the body (for example, where parameters from POST requests would end up).

About

Mitigations (AWS WAF, Lambda@Edge/CloudFront Functions) to implement on AWS to attempt to prevent log4j exploitation.

Topics

Resources

Stars

Watchers

Forks