关联漏洞
描述
Tools for remediating the recent log4j2 RCE vulnerability (CVE-2021-44228)
介绍
# `log4j-remediation-tools`
> Tools for finding and reproducing the [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) `log4j2` vulnerability
## Tools
- [`find-vulnerabilities`](./find-vulnerabilities): determine heuristically whether a running JVM is vulnerable
- [`confirm-vulnerabilities`](./confirm-vulnerabilities): determine with 100% accuracy whether a running JVM is vulnerable
## Usage
Both of these tools scan all running JVM processes on a machine, and produce a CSV report about which processes may be / are vulnerable.
Check out the corresponding READMEs for [`find-vulnerabilities/`](./find-vulnerabilities) and [`confirm-vulnerabilities/`](./confirm-vulnerabilities) for usage details.
### Which tool should I use?
Here are a few tradeoffs to help you determine which tool is right for your use case:
`find-vulnerabilities` is low-risk to run, but has the possibility of missing:
- Cases where a system property is not set on the CLI, e.g. at runtime
- Cases where the JVM has closed the file descriptor for the jar
- Non-standard / patched releases of `log4j2`
`confirm-vulnerabilities` uses the JVM Attach API which:
- May not work if an application explicitly disables this API
- May crash the running JVM due to JVM bugs
- May briefly slow down the running JVM while waiting for JVM pause
## Contributing
This project welcomes feedback and contributions; however, we might be slow to respond to or triage your requests. We appreciate your patience.
## License
This project uses the [MIT license](LICENSE.md).
## Code of conduct
This project has adopted the Stripe [Code of conduct](CODE_OF_CONDUCT.md).
文件快照
[4.0K] /data/pocs/203766ee76bceb89f50ecd80864b85b629347fab
├── [3.3K] CODE_OF_CONDUCT.md
├── [4.0K] confirm-vulnerabilities
│ ├── [4.3K] is-it-vulnerable.iml
│ ├── [2.3K] pom.xml
│ ├── [5.1K] README.md
│ └── [4.0K] src
│ └── [4.0K] main
│ └── [4.0K] java
│ └── [4.0K] com
│ └── [4.0K] stripe
│ └── [4.0K] log4j
│ └── [4.0K] isitvuln
│ ├── [1.0K] FileFormats.java
│ ├── [ 719] HostInfo.java
│ ├── [5.3K] InspectedJVM.java
│ ├── [3.5K] IsItVulnAgent.java
│ ├── [2.4K] IsItVuln.java
│ └── [1.3K] ProcessInfo.java
├── [4.0K] find-vulnerabilities
│ ├── [8.3K] fingerprint.go
│ ├── [ 358] go.mod
│ ├── [1.5K] go.sum
│ ├── [ 713] helpers.go
│ ├── [1.4K] jarfile.go
│ ├── [ 12K] log4j.go
│ ├── [2.7K] README.md
│ └── [ 753] version.go
├── [1.1K] LICENSE
└── [1.6K] README.md
9 directories, 20 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。