log4j-scan – Log4j RCE Scanning and Exploit Tool

log4j-scan - Log4j RCE CVE-2021-4428 Scanning and Exploit Tool

Log4j RCE or CVE-2021-44228 is a critical common vulnerability, this allow attacker to do remote code execution on target website. Scanning and Exploiting Log4j can be done manually and also you can automate this by using a tool for scanning and exploit Log4j RCE or CVE-2021-44228.

log4j-scan

A fully automated, accurate, and extensive scanner for finding vulnerable log4j (CVE-2021-44228) hosts or websites developed by Fullhunt.io.

Description

We have been researching the Log4J RCE (CVE-2021-44228) since it was released, and we worked in preventing this vulnerability with our customers. We are open-sourcing an open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability. This shall be used by security teams to scan their infrastructure for Log4J RCE, and also test for WAF bypasses that can result in achieving code execution on the organization’s environment.

It supports DNS OOB callbacks out of the box, there is no need to set up a DNS callback server.

Features

  • Support for lists of URLs.
  • Fuzzing for more than 60 HTTP request headers (not only 3-4 headers as previously seen tools).
  • Fuzzing for HTTP POST Data parameters.
  • Fuzzing for JSON data parameters.
  • Supports DNS callback for vulnerability discovery and validation.
  • WAF Bypass payloads.

Installation

pip3 install -r requirements.txt python3 log4j-scan.py -h

Usage

Scan a Single URL

python3 log4j-scan.py -u https://log4j.lab.secbot.local

Scan a Single URL using all Request Methods: GET, POST (url-encoded form), POST (JSON body).

python3 log4j-scan.py -u https://log4j.lab.secbot.local –run-all-tests

Discover WAF bypasses against the environment.

python3 log4j-scan.py -u https://log4j.lab.secbot.local –waf-bypass

Scan a list of URLs

python3 log4j-scan.py -l urls.txt

Legal Disclaimer

This project is made for educational and ethical testing purposes only. Usage of log4j-scan for attacking targets without prior mutual consent is illegal. It is the end user’s responsibility to obey all applicable local, state and federal laws. Developers assume no liability and are not responsible for any misuse or damage caused by this program.


You May Also Like

Leave a Reply

Your email address will not be published. Required fields are marked *

five × one =