关联漏洞
描述
CVE-2021-44228 Response Scripts
介绍
# CVE-2021-44228
This repository contains **altered** community scripts related to CVE-2021-44228 ported to EDR environments.
The scripts were modified to be compatible with other technologies' additional requirements.
See the linked repositories for an up-to-date and original version of the modified scripts.
## Palo Alto's Cortex XDR
_All the following scripts have been rendered compatible by implementing incompatible Python modules and exposing an `xdr` entry point.
Documentation regarding the `xdr` function's expected input and outputs can be found in each script._
- **[fox-it/log4j-finder](https://github.com/fox-it/log4j-finder) by NCC Group / Fox-IT / Research and Intelligence Fusion Team (RIFT)**
Scan the filesystem to find Log4j2 files that is vulnerable to Log4Shell (CVE-2021-44228).
It scans recursively both on disk and inside Java Archive files (JARs).
- **[Neo23x0/log4shell-detector](https://github.com/Neo23x0/log4shell-detector) by Florian Roth**
Checks local log files for indicators of exploitation attempts, even heavily obfuscated ones that string or regular expression based patterns wouldn't detect.
文件快照
[4.0K] /data/pocs/35ef602ea2e1f8a8625dfc6b42ca674c4d7dd92f
├── [9.6K] log4j-finder.py
├── [ 32K] log4shell-detector.py
└── [1.1K] README.md
0 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。