Skip to content

Mitigations (AWS WAF, Lambda@Edge/CloudFront Functions) to implement on AWS to attempt to prevent log4j exploitation.

Notifications You must be signed in to change notification settings

CyberSecOps/aws-log4j-mitigations

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

aws-log4j-mitigations

Mitigations to implement on AWS to attempt to prevent log4j exploitation.

AWS WAF

This is likely the best option to implement as Amazon will be able to keep the rule up-to-date.

Enable AWS-AWSManagedRulesKnownBadInputsRuleSet where Log4JRCE is available in the latest version.

You can find example Terraform to create the rule with just Log4RCE enabled here: aws_waf/rule.tf

Console:

Screenshot of the AWS WAF rule enabled in the AWS Console

CloudFront

If you'd like more control over filtering, suggest using Lambda@Edge and in particular origin requests with body enabled.

The faas_code/index.js attempts to capture bad inputs, it can also find base64 and test it (which systems may parse headers automatically before passing to log4j where it could be exploited).

The main engine of the code is using the following regex: /(?:\$|\%24)(?:\{|\%7b)[^\w]*?j[^\w]*?n[^\w]*?d[^\w]*?i[^\w]*?(?:\:|\%3a)/im;

Lambda@Edge

See cloudfront/lambda@edge/ for example Terraform of implementing the faas_code/index.js as a Lambda@Edge origin request.

CloudFront Functions

See cloudfront/functions/ for example Terraform of implementing the faas_code/index.js as a CloudFront Function viewer request.

Note: CloudFront Functions don't have an option to inspect the body (for example, where parameters from POST requests would end up).

About

Mitigations (AWS WAF, Lambda@Edge/CloudFront Functions) to implement on AWS to attempt to prevent log4j exploitation.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • JavaScript 74.1%
  • HCL 25.9%