diff --git a/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js b/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js index d76b3131f..0adec1540 100644 --- a/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js +++ b/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js @@ -1,5 +1,6 @@ import React from 'react'; import CollapsibleWellComponent from '../CollapsibleWell'; +import {Button} from 'react-bootstrap'; export function log4shellIssueOverview() { return (
  • Some servers are vulnerable to the Log4Shell remote code execution exploit.
  • ) @@ -14,8 +15,15 @@ export function log4shellIssueReport(issue) { className="badge badge-info" style={{margin: '2px'}}>{issue.ip_address}:{issue.port}) is vulnerable to the Log4Shell remote code execution attack.
    - The attack was made possible due to an old version of Apache Log4j component. CVE-2021-44228 + The attack was made possible due to an old version of Apache Log4j component ( + ). );