关联漏洞
描述
Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability
介绍
# log4j-log4shell-affected
Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE) for security responders.
We believe it is important to classify the vendors and products between:
1. Internal risk - what you need to patch first to remove risk internally
2. External risk - all third/fourth-party vendors that have custody of your data that might've been hacked that you will need to monitor and tackle once you're done patching
### Here are the lists:
#### [External Risk - Affected Apps](https://github.com/authomize/log4j-log4shell-affected/blob/master/affected_apps.md)
i.e. all vendors you should worry about if you have data in their environemnt or if they access to your environment
#### [Internal Risk - Affected Components](https://github.com/authomize/log4j-log4shell-affected/blob/master/affected_components.md)
i.e. software components you might have used in building your products that you should worry if they cause you to be vulnerable
## Other useful resources
### Lists
[Artifacts using log4j](https://mvnrepository.com/artifact/org.apache.logging.log4j/log4j-core)
[Compromised apps with confirmation](https://github.com/YfryTchsGD/Log4jAttackSurface)
[List of responses from various vendors, some affected and some not](https://gist.github.com/SwitHak/b66db3a06c2955a9cb71a8718970c592)
[Official list maintained by CISA - US Govt](https://github.com/cisagov/log4j-affected-db)
[Official list maintained by NCSC - NL govt, high update frequency](https://github.com/NCSC-NL/log4shell/tree/main/software)
### Guides how to repsond
[A fast and simple guide on what to do to respond to the log4j incident](https://www.authomize.com/blog/authomizes-response-and-mitigation-guide-to-the-log4shell-vulnerability/)
[General incident response guide in case you discover a 3rd party vendor of yours got hacked](https://resources.panorays.com/hubfs/assets/The_Third-Party_Incident_Response_Playbook.pdf)
## Contributing
We are happy to recieve contributions from the community.
Contribution guidelines:
- Please make a PR editing the raw CSV files.
- Please be sure to include a reference source for each added row (claims without a validated link for source of claim will not be accepted)
## About this repo
This repo is maintained to simplify response for enterprises and organizations by separating between:
1. Internal risk - Software components you need to search for and patch in your products / internal environment
2. External risk - Third and fourth-party vendors/apps who might've been affected and you should to monitor if your data is in their custody
This list is a community project open for everyone to contribute to and is curated by:

## Our favorite description of the situation

文件快照
[4.0K] /data/pocs/1bbd2e4be10b39185e6a766504886ddbd43502a5
├── [ 46K] affected_apps.md
├── [ 10K] affected_components.md
├── [4.0K] raw
│ ├── [ 17K] log4j affected apps.csv
│ └── [5.1K] log4j affected components.csv
└── [2.9K] README.md
1 directory, 5 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。