jeff 👨💻@programming.dev to Programming@programming.devEnglish · 2 years agoWhat are some examples of xkcd 2347?xkcd.comexternal-linkmessage-square95fedilinkarrow-up1163arrow-down11file-text
arrow-up1162arrow-down1external-linkWhat are some examples of xkcd 2347?xkcd.comjeff 👨💻@programming.dev to Programming@programming.devEnglish · 2 years agomessage-square95fedilinkfile-text
minus-squaresillypuddy@mander.xyzlinkfedilinkEnglisharrow-up8·2 years agohttps://theconversation.com/what-is-log4j-a-cybersecurity-expert-explains-the-latest-internet-vulnerability-how-bad-it-is-and-whats-at-stake-173896
minus-squareJackbyDev@programming.devlinkfedilinkEnglisharrow-up5·2 years agoBasically it involved parsing JNDI stuff which involved grabbing remote code (but that was a niche feature of JNDI in the Dev’s defense). Basically, you may think it is just something like variable substitution but can involve much crazier stuff
What was it?
https://theconversation.com/what-is-log4j-a-cybersecurity-expert-explains-the-latest-internet-vulnerability-how-bad-it-is-and-whats-at-stake-173896
Basically it involved parsing JNDI stuff which involved grabbing remote code (but that was a niche feature of JNDI in the Dev’s defense). Basically, you may think it is just something like variable substitution but can involve much crazier stuff
this is cool