Skip to content
GitHub

CVE-2021-44228


Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled. From log4j 2.15.0, this behavior has been disabled by default. In previous releases (>2.10) this behavior can be mitigated by setting system property “log4j2.formatMsgNoLookups” to “true” or it can be mitigated in prior releases (<2.10) by removing the JndiLookup class from the classpath (example: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class).

Please check NSCS-NL - log4shell - IoCs

Checks if the application is vulnerable to CVE-2021-44228.

SourceNotesLinks
crypt0janPerform a scan of a single host (using Powershell) to see if it’s vulnerablehttps://github.com/crypt0jan/log4j-powershell-checker
HuntressOnline Log4Shell Vulnerability Testerhttps://log4shell.huntress.com/
Canary TokensLog4Shell Vulnerability Testerhttps://canarytokens.org/generate
DivertoNmap NSE scripts to check against log4shellhttps://github.com/Diverto/nse-log4shell
righelNmap NSE script to inject jndi payloads with customizable templates into HTTP targetshttps://github.com/righel/log4shell_nse
silentsignalLog4Shell scanner for Burp Suitehttps://github.com/silentsignal/burp-log4shell
Northwave SecurityNorthwave Log4j CVE-2021-44228 checkerhttps://github.com/NorthwaveSecurity/log4jcheck
Northwave SecurityNorthwave Log4j CVE-2021-44228 checker Powershell versionhttps://github.com/crypt0jan/log4j-powershell-checker
OlafHaalstraScans a list of URLs with GET or POST request with user defined parametershttps://github.com/OlafHaalstra/log4jcheck
GrypeOpen source vulnerability scanner (docker), picks up nested JARs containing log4jhttps://github.com/anchore/grype
logpressoScans for java files that are vulnerable and may rename it for mitigationhttps://github.com/logpresso/CVE-2021-44228-Scanner
FullHuntOpen detection and scanning tool (Python) for discovering and fuzzing for Log4J vulnerabilityhttps://github.com/fullhunt/log4j-scan
DtactDIVD-2021-00038 log4j scanner Scan paths including archives for vulnerable log4https://github.com/dtact/divd-2021-00038—log4j-scanner
SourceNotesLinks
Neo23x0Florian Roth Log4j2 detection scripthttps://gist.github.com/Neo23x0/e4c8b03ff8cdf1fa63b7d15db6e3860b
sp4irPowershell script to detect Log4Shellhttps://github.com/sp4ir/incidentresponse/blob/35a2faae8512884bcd753f0de3fa1adc6ec326ed/Get-Log4shellVuln.ps1
NCCgroupVersion hashes (MD5, SHA1 and SHA256) for log4j2 versionshttps://github.com/nccgroup/Cyber-Defence/tree/master/Intelligence/CVE-2021-44228
1lannScans a file or folder recursively for jar files that may be vulnerablehttps://github.com/1lann/log4shelldetect
SyftOpen source SBOM scanner, can detect all dependencies including log4jhttps://github.com/anchore/syft/
DevotechPowershell: Queries domain servers and scans for log4j-core files. (slow)https://github.com/devotech/check-log4j

Please check NSCS-NL - log4shell - mitigation

Please check NCSC-NL - log4shell - software overview