====== Log4shell ====== On December the 9th, 2021, Apache published a severe vulnerability called [[https://nvd.nist.gov/vuln/detail/CVE-2021-44228|Log4shell]] (and other Log4j-related vulnerabilities). ===== Download ===== How to scan your services quickly, basically with log4j-scan from fullhunt, but using cisagov: git clone https://github.com/cisagov/log4j-scanner.git cd log4-scanner/ ==== Requirements ==== * python * python-requests * python-termcolor * python-pycryptodome ===== Create a url list ===== The easiest way is to create a list of all URLs you want to check: nano urls.txt https://techsaviours.org https://meet.techsaviours.org https://searx.techsaviours.org ===== Check your urls ===== python log4j-scan.py -l urls.txt --waf-bypass --run-all-tests or just a url python log4j-scan.py -u https://techsaviours.org --waf-bypass --run-all-tests