关联漏洞
描述
Simple bash script to scan multiples url for log4j vulnerability (CVE-2021-44228)
介绍
# scanlist-log4j
Simple bash script to scan multiples url for log4j vulnerability (CVE-2021-44228). This script uses the log4j scanner from **Fullhunt** : [https://github.com/fullhunt/log4j-scan](https://github.com/fullhunt/log4j-scan), and allow a better reading of results when testing multiples urls from a file.

## Installation
First, install the Fullhunt `scan-log4j` repository with :
```
git clone https://github.com/fullhunt/log4j-scan.git
cd log4j-scan
pip3 install -r requirements.txt
cd ..
```
Then install this script with :
```
git clone https://github.com/Gyrfalc0n/scanlist-log4j.git
cd scanlist-log4j
mv *.sh ../log4j-scan
cd ../log4j-scan
```
Now you are ready to execute the script, but before that you need a file containing the urls you want to scan for log4j vulnerability. Make sure the file is readable and in the same directory of the scripts.
## Execution
Execute the script with :
```
./scanlist-log4j.sh <url_list_file>
```
Each url to scan will be scanned simultaneously in a thread, resulting of a much faster execution time when scanning for multiples urls. Results are printed in terminal as the screen above. You always can check details in the `output.log` file.
## Check if host are up and running http/https
```
./check-domains.sh <url_list_file>
```
This script may be a bit slow, it uses `curl` to get response code from web page of urls and return if page is up.
## Modifications
`scanlist-log4j.sh` starts `scan.sh` with `scan-log4j` command for each line of file passed in first argument.
If you want to customize your command with `scan-log4j`, feel free to check the usage from the [repository](https://github.com/fullhunt/log4j-scan/blob/master/README.md#usage) and modify the `scan.sh` script which contains the command.
文件快照
[4.0K] /data/pocs/ea41360faef2ad349486106d8dd053207ceb1e0f
├── [ 67K] Capture.PNG
├── [ 365] check-domains.sh
├── [ 34K] LICENSE
├── [1.8K] README.md
├── [ 700] scanlist-log4j.sh
└── [ 190] scan.sh
0 directories, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。