关联漏洞
描述
An Inspec profile to check for Log4j CVE-2021-44228 and CVE-2021-45046
介绍
# inspec-log4j
This profile scans for vulnerable versions of Log4j Core JAR files directly on the file system, and embedded in WAR files.
## Running the profile locally
```
git clone https://github.com/trickyearlobe/inspec-log4j
inspec exec inspec-log4j
```
## Running the profile against a remote SSH target
Ensure you have SSH keys loaded for a privileged user (such as root) on the target.
Alternatively, check the [CLI docs](https://docs.chef.io/inspec/cli/) to see how to use Inspec with SUDO
```
git clone https://github.com/trickyearlobe/inspec-log4j
inspec exec inspec-log4j -t ssh://root@host
```
## Packaging the profile for upload to Chef Automate
```
git clone https://github.com/trickyearlobe/inspec-log4j
inspec archive inspec-log4j
```
文件快照
[4.0K] /data/pocs/7f889a8a86fe2fe9fe98a2fdfe8b7c96dceb9b55
├── [4.0K] controls
│ └── [2.4K] log4j-core.rb
├── [ 36] inspec.lock
├── [ 246] inspec.yml
├── [4.0K] libraries
│ ├── [1.9K] jar_file.rb
│ └── [ 754] war_file_jar.rb
└── [ 759] README.md
2 directories, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。