Hello there,

If you don't know yet, a CVE was published on friday about library log4j,
allowing a remote code execution with a crafted HTTP request.

We would like to filter these requests on HAProxy to lower the exposition.
At peak times, 20% of our web traffic is scanners about this bug !

The offended string is "${jndi:". It must be filtered on any fields that
could go to log servers:
- URL
- User-Agent
- User name

What would be the easier way to do that ? If I give it a try :

http-request deny deny_status 405 if { url_sub -i "\$\{jndi:" or
hdr_sub(user-agent) -i "\$\{jndi:" }


What do you think ?

Olivier

Reply via email to