Company
Date Published
Author
Michael Heap
Word count
896
Language
English
Hacker News points
None

Summary

Amidst the widespread concerns over the Log4Shell zero-day vulnerability in the Log4J Java logging library, which enables remote code execution, Kong has confirmed that none of its products or internal systems are affected due to its use of languages other than Java. To help users protect their own applications from this vulnerability, Kong offers solutions such as the Request Transformer Plugin and the creation of custom plugins using Kong's plugin system, which can help block malicious requests by manipulating request headers. Despite the evolving nature of the threat, including sophisticated obfuscation techniques that bypass traditional filters, Kong provides tools and methods to mitigate risks, such as normalizing and sanitizing request headers. Additionally, users can utilize an Insomnia collection to test their applications against potential vulnerabilities, ensuring a proactive approach to securing infrastructure.