[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or "that Log4j JNDI exploit" by inspecting the class paths inside files

License

Notifications You must be signed in to change notification settings

1lann/log4shelldetect

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

18 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

log4shelldetect

Scans a file or folder recursively for Java programs that may be vulnerable to:

  • CVE-2021-44228 (Log4Shell) (v2.0.x - v2.14.x)
  • CVE-2021-45046 (v2.15.x)
  • CVE-2021-45105 (v2.16.x)1

by inspecting the class paths inside files.

If you only want possibly vulnerable files to be printed rather than all files, run with -mode list.

Demo of log4shelldetect

Usage

Usage: log4shelldetect [options] <path>

Options:
  -include-zip
        include zip files in the scan
  -mode string
        the output mode, either "report" (every java archive pretty printed) or "list" (list of potentially vulnerable files) (default "report")

License

Code here is released to the public domain under unlicense.

With the exception of velocity-1.1.9.jar which is an example vulnerable .jar file part of Velocity which is licensed under GPLv3.

Footnotes

  1. 2.12.2 detection is not available yet pending 2.12.3's release which I will need to test. 2.12.2 will appear as patched.

About

Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or "that Log4j JNDI exploit" by inspecting the class paths inside files

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages