From fee19ab5a2af710d09c1ae4fa618f3b51b2fe314 Mon Sep 17 00:00:00 2001 From: Forrest Date: Thu, 30 Dec 2021 11:18:00 -0800 Subject: [PATCH] Dana incoming edits two (#392) * edited zero-day-mitigation-guide and zero-day-update * Update 2021-12-12-log4j-zero-day-mitigation-guide.mdx * Update 2021-12-14-log4j-zero-day-update-on-CVE-2021-45046.mdx * tender is a weird word * fix confusing line about 'pasting into your server' Co-authored-by: aniratepanda --- docs/blog/2021-12-12-log4j-zero-day-mitigation-guide.mdx | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/docs/blog/2021-12-12-log4j-zero-day-mitigation-guide.mdx b/docs/blog/2021-12-12-log4j-zero-day-mitigation-guide.mdx index a89022f24..cba98d607 100644 --- a/docs/blog/2021-12-12-log4j-zero-day-mitigation-guide.mdx +++ b/docs/blog/2021-12-12-log4j-zero-day-mitigation-guide.mdx @@ -292,8 +292,9 @@ We have built a live-patching tool and a hosted live-patching server to make thi ${jndi:ldap://patch.log4shell.com:1389/a} ``` -Using this will patch your server against future exploitation _until it restarts_. Simply paste the above line anywhere into -your server where you're vulnerable, to use it. For example, in the `main` function when you start up your server, or in a known + +Using this will patch your server against future exploitation _until it restarts_. Simply paste the above line into a request +field that your server logs. For example, in the `main` function when you start up your server, or in a known vulnerable field if it's a vendor product you depend on. We have added this functionality to the [latest release](https://github.com/lunasec-io/lunasec/releases) of our