Like many of us, I've been trying to following mitigation howtos, running various python scripts to test vulnerabilities of my server.
I have a few Ubuntu and Centos servers. None of them run LDAP or even have java installed, to the point where I can't even follow step 1 of many of the "test your server" articles.
Am I correct that the only other entry point of the vulnerability would be to install Java-specific software that utilizes the log4 component?
I'm racking my brain to think of anything that I'd install that is beyond the use of hosting websites: Apache, nginx, LetsEncrypt, fail2ban, php - those are the extent of the type of additional software that is installed.
Even a find / -name "*log4j*
or find / -name "*.jar"
comes up empty.