#Log4shell
This pattern shows up across the industry, not just in JavaScript. For example, after Log4Shell, additional CVEs were reported as the community examined the original fix.

Additional disclosures can be frustrating, but they are generally a sign of a healthy response cycle.
December 11, 2025 at 8:51 PM
AWS Lambda adds support for Java 25

AWS Lambda now supports Java 25! They're very proud they "removed the patch for the Log4Shell vulnerability from 2021" which is definitely how you want to phrase "we finally updated Java." Also it's available in "all Regions" which means your bill is too.
November 14, 2025 at 11:11 PM
When your dad breaks Minecraft.

And the internet.

Watch the full interview about the biggest security vulnerability of all time 👉 https://github.blog/open-source/inside-the-breach-that-broke-the-internet-the-untold-story-of-log4shell/?utm_source=social&utm_medium=social&utm_campaign=minecraft
November 12, 2025 at 11:21 AM
Write your developer horror story in 5 words or less. 🎃

We'll go first: Remote code execution.

https://github.blog/open-source/inside-the-breach-that-broke-the-internet-the-untold-story-of-log4shell/

October 31, 2025 at 11:45 AM
Only a few days ago, I joined Abby and Felix Reda on the Github Podcast—to talk about funding in #opensource that we have received from @sovereign.tech

podcasts.apple.com/de/podcast/f...

#java #log4j #log4shell
From Log4Shell to the Sovereign Tech Fund: Lessons in Open Source Sustainability
Podcast-Folge · The GitHub Podcast · 21.10.2025 · 31 Min.
podcasts.apple.com
October 25, 2025 at 5:46 AM
log4shell is a great example that you can have a very large impact without memory safety bugs. The same thing could have been written in Rust...
October 23, 2025 at 7:38 PM
It took one global incident for the world to see how vital open source maintainers are.

In this episode of The GitHub Podcast, we talk to Christian Grobmeier about the aftermath of Log4Shell and what it means for the future of open source funding. the-github-podcast.simplecast.com/episodes/fro...
From Log4Shell to the Sovereign Tech Fund: Lessons in Open Source Sustainability | The GitHub Podcast
In this episode of the GitHub Podcast, Abby sits down with Felix Reda, Director of Developer Policy at GitHub, and Christian Grobmeier, a longtime Log4J maintainer, to reflect on the aftermath of the ...
the-github-podcast.simplecast.com
October 22, 2025 at 10:48 AM
GitHub Podcast Episode 41 - From Log4Shell to the Sovereign Tech Fund: Lessons in Open-Source Sustainability

buff.ly/VNda5qM

#podcast #github #log4shell #security #oss #devcommunity
From Log4Shell to the Sovereign Tech Fund: Lessons in Open Source Sustainability | The GitHub Podcast
In this episode of the GitHub Podcast, Abby sits down with Felix Reda, Director of Developer Policy at GitHub, and Christian Grobmeier, a longtime Log4J maintainer, to reflect on the aftermath of the…
buff.ly
October 21, 2025 at 9:00 PM
I never imagined GitHub would ask me to speak about #Log4Shell.
But it happened.

@github.com asked me to share the story as I lived it, for the benefit of users of #opensource. How could I say no?

I hope it helps build a more secure future.
No more Log4Shell.

#java
github.com GitHub @github.com · Oct 20
The internet was on fire. 🔥
One small library affecting billions of systems.
Log4Shell was the biggest security vulnerability of all time.

Now, Log4J maintainer, Christian Grobmeier tells us what it felt like inside the flames 👉 github.blog/open-source/...
October 20, 2025 at 8:01 PM
The internet was on fire. 🔥
One small library affecting billions of systems.
Log4Shell was the biggest security vulnerability of all time.

Now, Log4J maintainer, Christian Grobmeier tells us what it felt like inside the flames 👉 github.blog/open-source/...
October 20, 2025 at 6:37 PM
What I've learned about Log4Shell by implementing several RCEs:

royvanrijn.com/blog/2021/12/l…
November 25, 2024 at 9:35 AM
FritzFrog Returns with Log4Shell and PwnKit, Spreading Malware Inside Your Network #potatosecurity #infosec #privacy #news themashernews.com/20...
February 1, 2024 at 4:44 PM
I'm not in the java ecosystem. Has the {x}4j branding suffered at all? Because whenever I hear, for example neo4j, I immediately think of log4j and log4shell
March 6, 2025 at 8:05 AM
2025年にLog4Shellが4,000万回ダウンロードされる

Sonatypeによると、今年人気のJavaロギングライブラリであるLog4jは数千万回ダウンロードされたが、その多くが4年前に初めて明らかになったCVSSスコア10.0の脆弱性に対して依然として脆弱な状態だったという。 同セキュリティベンダーは、2025年におけるLog4jのダウンロードの13%が依然としてLog4Shellに対して脆弱であり、オープンソースエコシステムにおける持続的なリスクの課題を示していると主張した。…
2025年にLog4Shellが4,000万回ダウンロードされる
Sonatypeによると、今年人気のJavaロギングライブラリであるLog4jは数千万回ダウンロードされたが、その多くが4年前に初めて明らかになったCVSSスコア10.0の脆弱性に対して依然として脆弱な状態だったという。 同セキュリティベンダーは、2025年におけるLog4jのダウンロードの13%が依然としてLog4Shellに対して脆弱であり、オープンソースエコシステムにおける持続的なリスクの課題を示していると主張した。 「一方には、上流で決してパッチが当てられない“未修正リスク”があります。もう一方には、修正は存在するにもかかわらず、利用者が移行しないために広がり続ける“腐食性リスク”があります」と同社は説明した。 「Log4jの脆弱性と、その横で広く利用されているcommonsパッケージ群は、大規模な腐食性リスクの典型例となっています。」 SonatypeはMaven Centralのダウンロードデータを分析し、今年の3億件のLog4jダウンロードのうち4,000万件がバグを含んでいたことを明らかにした。 開発者人口が多い国の中では、インド(29%)、中国(28%)、日本(22%)がいずれもLog4Shellを含むダウンロードの大きな割合を記録した。米国(9%)、ブラジル(8%)、フランス(8%)はそれより良好な結果だったものの、それでも回避可能な脆弱ダウンロードが数百万件に上ったとSonatypeは主張している。 Log4Shellの詳細はこちら:Log4Shellバグの影響は誇張されていたと研究者が指摘 問題はLog4jにとどまらない。Sonatypeは、脆弱なコンポーネントを含むダウンロードのおよそ95%には、より安全なバージョンが存在する一方で、実際に修正が存在しないコンポーネントは約0.5%に過ぎないと述べている。 同社によれば、開発者がこうしたミスを繰り返すのは、設定後に放置される依存関係、推移的依存関係に対する盲点、そして人気を重視してセキュリティ姿勢を軽視するライブラリ選定基準の欠陥が原因だという。 ソフトウェアコンポジション解析(SCA)のようなセキュリティツールは、実行可能な指針を欠いた大量のアラートで開発者を圧倒し、さらに状況を悪化させる可能性がある。一方で、プロダクトマネージャーは依然としてセキュリティよりも市場投入までの時間を優先するようインセンティブ付けされている。 不要なリスクの排除 Sonatypeは、開発者に対し、既知の悪性バージョンのコンポーネントを取得しないよう、次の取り組みを行うよう促している。 SCAツールやアーティファクトリポジトリを活用し、どれだけのダウンロードが脆弱なのか、どのコンポーネントがビルドに含まれているのか(およびそのバージョン)、どのチーム/アプリケーション/事業部門が責任を負っているのかを把握する コンポーネントの選定方法を見直し、セキュリティ実績、積極的なメンテナンス、ガバナンス、透明性を優先する 安全なバージョンへのアップグレード用プルリクエストを自動化し、非破壊的なアップグレードを定期的にまとめて実施し、社内リポジトリで安全なバージョンへのオートコンプリートを行い、既知の脆弱バージョンを取得しようとした際には自動的にアラートを出す アーティファクトリポジトリやCI/CDパイプラインにガードレールを設け、修正が存在する既知の脆弱バージョンのダウンロード/利用をブロックする 「不要なリスク率」「修正採用までの時間」「ポリシー有効性」といった新たな指標を採用する 翻訳元:
blackhatnews.tokyo
December 10, 2025 at 11:09 AM
i also don't think it's out of the realm of possibility that the engineering processes and prioritization didn't allow for a more thorough investigation/remediation at the time, because it almost never does. the only things i've seen that can interrupt a roadmap is security stuff (log4shell, etc.)
July 22, 2025 at 2:02 PM
This sounds... really fecking huge. 🤯The Log4Shell zeroday 4 days on. What is it and how bad is it really? | Ars Technica
November 16, 2024 at 6:24 PM
そういや、Log4shellって攻撃用のLDAPサーバ立ててたけど、こういう特定プロトコルのフェイクサーバをフックさせて攻撃する系のやつって、まだまだ世の中にありそうだよなぁ。内部的に閉じた通信だと思って油断しやすそう。
September 28, 2024 at 2:07 AM
Huge kudos to my colleagues @TrendMicro working 24/7 through the weekend to identify and remediate any #log4j #log4shell instances in our products and services. Awesome to behold!
November 17, 2024 at 6:33 PM
in a computer no such auditing is (currently) possible

you can check and double-check and triple-check the code in advance (and it can still have errors, see any major bug from heartbleed to log4shell) but there's zero guarantee that the code on the machine is the code you have checked
October 27, 2024 at 11:16 PM
publicando un código de explotación en GitHub.
Afectó en forma drástica a los servidores de Minecraft, Cloudflare, Microsoft y Amazon.
#retrocomputingmx #Log4Shell #vulnerability
December 10, 2024 at 1:48 AM
📌 Two additional Log4Shell vulnerabilities discovered in Log4J, acknowledged in September 2022. No patches or new CVEs issued. #CyberSecurity #Log4J https://tinyurl.com/yu79abmn
Log4j Vulnerabilities: Overlooked Exploits Highlight Gaps in Patch Management
In December 2021, the cybersecurity community was alerted to four critical vulnerabilities in the Log4j library, collectively known as Log4Shell. These vulnerabilities were promptly addressed with patches. However, it has since come to light that additional vulnerabilities, specifically a denial of service (DoS) and a data leak, were not widely recognized at the time. It wasn't until September 2022 that the vendor officially acknowledged these vulnerabilities, classifying them as part of the initial four bugs. Consequently, no specific patches or new Common Vulnerabilities and Exposures (CVE) identifiers were assigned to these additional issues. This revelation has significant implications for the cybersecurity landscape. Log4j is a ubiquitous logging library used in numerous Java applications, making its vulnerabilities a widespread concern. The initial Log4Shell vulnerabilities were critical due to their potential for remote code execution (RCE), but the overlooked DoS and data leak vulnerabilities are also substantial threats. DoS attacks can disrupt services, while data leaks can expose sensitive information, both of which can have severe operational and reputational impacts. The vendor's delayed acknowledgment and the lack of new CVEs or patches for these vulnerabilities raise concerns about the thoroughness of initial vulnerability assessments. It underscores the necessity for organizations to conduct comprehensive security evaluations rather than relying solely on vendor-provided patches. Moreover, the absence of new CVEs means that these vulnerabilities might not be adequately tracked or mitigated in vulnerability databases, potentially leaving systems exposed to these risks. From an expert perspective, this situation highlights the importance of continuous monitoring and updating of software components. Cybersecurity professionals must remain vigilant and proactive in identifying and mitigating vulnerabilities, even those not immediately recognized or patched by vendors. It also emphasizes the need for robust vulnerability management processes that include thorough testing and verification beyond initial vendor patches. In conclusion, the discovery of overlooked vulnerabilities in Log4j serves as a critical reminder of the complexities involved in vulnerability management. It calls for a more rigorous approach to identifying and addressing security issues, ensuring that all potential vulnerabilities are accounted for and mitigated effectively.
tinyurl.com
July 14, 2025 at 3:42 AM
being reminded of the log4shell attack today
September 22, 2025 at 11:40 AM
The internet was on fire. One small library affecting billions of systems. Log4Shell was the biggest security vulnerability of all time. Now, Log4J maintainer, @grobmeier.de, tells @github.com what it felt like inside the flames.
October 28, 2025 at 2:19 PM