Log4shell is making the news. A vulnerability in the widely used logging tool Log4J is putting many servers and even some desktop applications at risk of remote code execution.
How does this vulnerability work? What sort of mistake makes it possible? It is something about format strings and ${jndi:...}
, but why would a string like that cause remote code execution?
I'm looking for an explanation on a level suitable for an IT professional without any experience with Log4J or advanced security issues. Sort of like how you would explain SQLi or XSS to a newbie web developer.