关联漏洞
标题:Apache Log4j 代码问题漏洞 (CVE-2021-44228)Description:Apache Log4j是美国阿帕奇(Apache)基金会的一款基于Java的开源日志记录工具。 Apache Log4J 存在代码问题漏洞,攻击者可设计一个数据请求发送给使用 Apache Log4j工具的服务器,当该请求被打印成日志时就会触发远程代码执行。
Description
An Inspec profile to check for Log4j CVE-2021-44228 and CVE-2021-45046
介绍
# inspec-log4j
This profile scans for vulnerable versions of Log4j Core JAR files directly on the file system, and embedded in WAR files.
## Running the profile locally
```
git clone https://github.com/trickyearlobe/inspec-log4j
inspec exec inspec-log4j
```
## Running the profile against a remote SSH target
Ensure you have SSH keys loaded for a privileged user (such as root) on the target.
Alternatively, check the [CLI docs](https://docs.chef.io/inspec/cli/) to see how to use Inspec with SUDO
```
git clone https://github.com/trickyearlobe/inspec-log4j
inspec exec inspec-log4j -t ssh://root@host
```
## Packaging the profile for upload to Chef Automate
```
git clone https://github.com/trickyearlobe/inspec-log4j
inspec archive inspec-log4j
```
文件快照
[4.0K] /data/pocs/7f889a8a86fe2fe9fe98a2fdfe8b7c96dceb9b55
├── [4.0K] controls
│ └── [2.4K] log4j-core.rb
├── [ 36] inspec.lock
├── [ 246] inspec.yml
├── [4.0K] libraries
│ ├── [1.9K] jar_file.rb
│ └── [ 754] war_file_jar.rb
└── [ 759] README.md
2 directories, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。