{"id":28118,"date":"2021-12-15T09:08:25","date_gmt":"2021-12-15T09:08:25","guid":{"rendered":"https:\/\/hosting.nl\/blog\/the-log4shell-vulnerability\/"},"modified":"2023-11-27T13:16:55","modified_gmt":"2023-11-27T13:16:55","slug":"the-log4shell-vulnerability","status":"publish","type":"post","link":"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/","title":{"rendered":"The Log4Shell vulnerability"},"content":{"rendered":"\n<p><strong>Once in a while, the IT world is rocked by a security vulnerability in software that grips the entire industry. Last Friday, another new one was added: a leak in Apache Log4j named <a href=\"https:\/\/en.wikipedia.org\/wiki\/Log4Shell\">Log4Shell<\/a>. The services we offer to clients do not use Java and\/or the vulnerable log4j tool. But we want to inform you about this. You can find the <a href=\"https:\/\/cyso.com\/de-log4shell-kwetsbaarheid\/\">full article on Log4Shell<\/a> at our sister organization Cyso.<\/strong><\/p>\n\n<h2 class=\"wp-block-heading\">WHAT IS GOING ON?<\/h2>\n\n<p>A serious vulnerability has been found in the widely used log4j tool, which is used for logging Java applications. The vulnerability in the software allows unauthenticated users to remotely inject and execute arbitrary code with relative ease under the same privileges as the affected Java application. It resides in many hundreds, if not thousands, of software products and (cloud) applications. The risk of exploits and misuse was immediately labeled as life-threatening.<\/p>\n\n<h2 class=\"wp-block-heading\">QUESTIONS? GET IN TOUCH<\/h2>\n\n<p>If you have any questions after reading the article about the impact for Log4Shell on your systems, don&#8217;t hesitate to contact us. This can be done via <a href=\"https:\/\/hosting.nl\/en\/\">chat<\/a>, <a href=\"mailto:support@sqr.nl\">email<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Once in a while, the IT world is rocked by a security vulnerability in software that grips the entire industry. Last Friday, another new one was added: a leak in Apache Log4j named Log4Shell. The services we offer to clients do not use Java and\/or the vulnerable log4j tool. But we want to inform you [&hellip;]<\/p>\n","protected":false},"author":33,"featured_media":26863,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"class_list":["post-28118","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nieuws"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Log4Shell vulnerability | Hosting.NL<\/title>\n<meta name=\"description\" content=\"Are you curious if the vulnerability in the log4j tool affects your services from Hosting.NL? We explain it in this article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Log4Shell vulnerability | Hosting.NL\" \/>\n<meta property=\"og:description\" content=\"Are you curious if the vulnerability in the log4j tool affects your services from Hosting.NL? We explain it in this article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"Hosting.NL\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-15T09:08:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-27T13:16:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hosting.nl\/wp-content\/uploads\/log4j-code-site-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"740\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Martijn Wokke\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Martijn Wokke\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/\"},\"author\":{\"name\":\"Martijn Wokke\",\"@id\":\"https:\/\/hosting.nl\/en\/#\/schema\/person\/a0747ead6608b258bf610a41959b1579\"},\"headline\":\"The Log4Shell vulnerability\",\"datePublished\":\"2021-12-15T09:08:25+00:00\",\"dateModified\":\"2023-11-27T13:16:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/\"},\"wordCount\":190,\"publisher\":{\"@id\":\"https:\/\/hosting.nl\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hosting.nl\/wp-content\/uploads\/log4j-code-site-1.jpg\",\"articleSection\":[\"Nieuws\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/\",\"url\":\"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/\",\"name\":\"The Log4Shell vulnerability | Hosting.NL\",\"isPartOf\":{\"@id\":\"https:\/\/hosting.nl\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hosting.nl\/wp-content\/uploads\/log4j-code-site-1.jpg\",\"datePublished\":\"2021-12-15T09:08:25+00:00\",\"dateModified\":\"2023-11-27T13:16:55+00:00\",\"description\":\"Are you curious if the vulnerability in the log4j tool affects your services from Hosting.NL? We explain it in this article.\",\"breadcrumb\":{\"@id\":\"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/#primaryimage\",\"url\":\"https:\/\/hosting.nl\/wp-content\/uploads\/log4j-code-site-1.jpg\",\"contentUrl\":\"https:\/\/hosting.nl\/wp-content\/uploads\/log4j-code-site-1.jpg\",\"width\":740,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Hosting.NL\",\"item\":\"https:\/\/hosting.nl\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Log4Shell vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hosting.nl\/en\/#website\",\"url\":\"https:\/\/hosting.nl\/en\/\",\"name\":\"Hosting.NL\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/hosting.nl\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hosting.nl\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hosting.nl\/en\/#organization\",\"name\":\"Hosting.NL\",\"url\":\"https:\/\/hosting.nl\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hosting.nl\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hosting.nl\/wp-content\/uploads\/hostingnl-default-logo.png\",\"contentUrl\":\"https:\/\/hosting.nl\/wp-content\/uploads\/hostingnl-default-logo.png\",\"width\":242,\"height\":50,\"caption\":\"Hosting.NL\"},\"image\":{\"@id\":\"https:\/\/hosting.nl\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/hosting.nl\/en\/#\/schema\/person\/a0747ead6608b258bf610a41959b1579\",\"name\":\"Martijn Wokke\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/hosting.nl\/wp-content\/litespeed\/avatar\/b8eb75dd01c57262bfac8440a3fba249.jpg?ver=1776271489\",\"url\":\"https:\/\/hosting.nl\/wp-content\/litespeed\/avatar\/b8eb75dd01c57262bfac8440a3fba249.jpg?ver=1776271489\",\"contentUrl\":\"https:\/\/hosting.nl\/wp-content\/litespeed\/avatar\/b8eb75dd01c57262bfac8440a3fba249.jpg?ver=1776271489\",\"caption\":\"Martijn Wokke\"},\"url\":\"https:\/\/hosting.nl\/en\/blog\/author\/martijn-wokkecyso-group\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Log4Shell vulnerability | Hosting.NL","description":"Are you curious if the vulnerability in the log4j tool affects your services from Hosting.NL? We explain it in this article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"The Log4Shell vulnerability | Hosting.NL","og_description":"Are you curious if the vulnerability in the log4j tool affects your services from Hosting.NL? We explain it in this article.","og_url":"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/","og_site_name":"Hosting.NL","article_published_time":"2021-12-15T09:08:25+00:00","article_modified_time":"2023-11-27T13:16:55+00:00","og_image":[{"width":740,"height":400,"url":"https:\/\/hosting.nl\/wp-content\/uploads\/log4j-code-site-1.jpg","type":"image\/jpeg"}],"author":"Martijn Wokke","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Martijn Wokke","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/#article","isPartOf":{"@id":"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/"},"author":{"name":"Martijn Wokke","@id":"https:\/\/hosting.nl\/en\/#\/schema\/person\/a0747ead6608b258bf610a41959b1579"},"headline":"The Log4Shell vulnerability","datePublished":"2021-12-15T09:08:25+00:00","dateModified":"2023-11-27T13:16:55+00:00","mainEntityOfPage":{"@id":"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/"},"wordCount":190,"publisher":{"@id":"https:\/\/hosting.nl\/en\/#organization"},"image":{"@id":"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/hosting.nl\/wp-content\/uploads\/log4j-code-site-1.jpg","articleSection":["Nieuws"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/","url":"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/","name":"The Log4Shell vulnerability | Hosting.NL","isPartOf":{"@id":"https:\/\/hosting.nl\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/#primaryimage"},"thumbnailUrl":"https:\/\/hosting.nl\/wp-content\/uploads\/log4j-code-site-1.jpg","datePublished":"2021-12-15T09:08:25+00:00","dateModified":"2023-11-27T13:16:55+00:00","description":"Are you curious if the vulnerability in the log4j tool affects your services from Hosting.NL? We explain it in this article.","breadcrumb":{"@id":"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/#primaryimage","url":"https:\/\/hosting.nl\/wp-content\/uploads\/log4j-code-site-1.jpg","contentUrl":"https:\/\/hosting.nl\/wp-content\/uploads\/log4j-code-site-1.jpg","width":740,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/hosting.nl\/en\/blog\/the-log4shell-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Hosting.NL","item":"https:\/\/hosting.nl\/en\/"},{"@type":"ListItem","position":2,"name":"The Log4Shell vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/hosting.nl\/en\/#website","url":"https:\/\/hosting.nl\/en\/","name":"Hosting.NL","description":"","publisher":{"@id":"https:\/\/hosting.nl\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hosting.nl\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hosting.nl\/en\/#organization","name":"Hosting.NL","url":"https:\/\/hosting.nl\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hosting.nl\/en\/#\/schema\/logo\/image\/","url":"https:\/\/hosting.nl\/wp-content\/uploads\/hostingnl-default-logo.png","contentUrl":"https:\/\/hosting.nl\/wp-content\/uploads\/hostingnl-default-logo.png","width":242,"height":50,"caption":"Hosting.NL"},"image":{"@id":"https:\/\/hosting.nl\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/hosting.nl\/en\/#\/schema\/person\/a0747ead6608b258bf610a41959b1579","name":"Martijn Wokke","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hosting.nl\/wp-content\/litespeed\/avatar\/b8eb75dd01c57262bfac8440a3fba249.jpg?ver=1776271489","url":"https:\/\/hosting.nl\/wp-content\/litespeed\/avatar\/b8eb75dd01c57262bfac8440a3fba249.jpg?ver=1776271489","contentUrl":"https:\/\/hosting.nl\/wp-content\/litespeed\/avatar\/b8eb75dd01c57262bfac8440a3fba249.jpg?ver=1776271489","caption":"Martijn Wokke"},"url":"https:\/\/hosting.nl\/en\/blog\/author\/martijn-wokkecyso-group\/"}]}},"_links":{"self":[{"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/posts\/28118","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/comments?post=28118"}],"version-history":[{"count":3,"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/posts\/28118\/revisions"}],"predecessor-version":[{"id":28121,"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/posts\/28118\/revisions\/28121"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/media\/26863"}],"wp:attachment":[{"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/media?parent=28118"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/categories?post=28118"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hosting.nl\/en\/wp-json\/wp\/v2\/tags?post=28118"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}