Server vulnerable to Log4J CVE-2021-44228. The reply originated from a backend server, the originating frontend server has been included in the report for reference.
It is critical to patch log4j or the application using since the issues is exploited in the wild and leads to RCE.
Received reply after a Log4j payload from this host
Ping was received because of query value
Reply took 5.015895713s
Orignal request was to 81.246.19.79:9000
This event's HTTP and SSL details are preserved from the orignal request.
Orignal reply:
5265636569766564207265706c792061667465722061204c6f67346a207061796c6f61642066726f6d207468697320686f73740a50696e67207761732072656365697665642062656361757365206f662071756572792076616c75650a5265706c7920746f6f6b20352e303135383935373133730a4f7269676e616c20726571756573742077617320746f2038312e3234362e31392e37393a393030300a54686973206576656e742773204854545020616e642053534c2064657461696c7320617265207072657365727665642066726f6d20746865206f7269676e616c20726571756573742e0a
Email from: www-data@csirt.proximus.com Dear, According to our records, your request has been resolved. If you have any further questions or concerns, please respond to this message. Best regards. -- Cyber Security Incident Response Team | CSIRT Koning Albert II Laan 27, B-1030 Brussels