From 76d6071f7c175b6526a34e56018a1b175aab1888 Mon Sep 17 00:00:00 2001 From: vakarisz Date: Wed, 19 Jan 2022 15:09:03 +0200 Subject: [PATCH] Island: add cve link to log4shell report --- .../report-components/security/issues/Log4ShellIssue.js | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js b/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js index 4c1bffb39..d76b3131f 100644 --- a/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js +++ b/monkey/monkey_island/cc/ui/src/components/report-components/security/issues/Log4ShellIssue.js @@ -14,7 +14,8 @@ export function log4shellIssueReport(issue) { className="badge badge-info" style={{margin: '2px'}}>{issue.ip_address}:{issue.port}) is vulnerable to the Log4Shell remote code execution attack.
- The attack was made possible due to an old version of Apache Log4j component. + The attack was made possible due to an old version of Apache Log4j component. CVE-2021-44228 );