All Projects → authomize → log4j-log4shell-affected

authomize / log4j-log4shell-affected

Licence: other
Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability

Projects that are alternatives of or similar to log4j-log4shell-affected

log4jshield
Log4j Shield - fast ⚡, scalable and easy to use Log4j vulnerability CVE-2021-44228 finder and patcher
Stars: ✭ 13 (-73.47%)
Mutual labels:  log4j, cve-2021-44228
log4shelldetect
Rapidly scan filesystems for Java programs potentially vulnerable to Log4Shell (CVE-2021-44228) or "that Log4j JNDI exploit" by inspecting the class paths inside files
Stars: ✭ 40 (-18.37%)
Mutual labels:  log4j, cve-2021-44228
Log4jPatcher
A mitigation for CVE-2021-44228 (log4shell) that works by patching the vulnerability at runtime. (Works with any vulnerable java software, tested with java 6 and newer)
Stars: ✭ 43 (-12.24%)
Mutual labels:  log4j, cve-2021-44228
log4j-scanner
log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.
Stars: ✭ 1,212 (+2373.47%)
Mutual labels:  log4j, cve-2021-44228
log4shell-finder
Fastest filesystem scanner for log4shell (CVE-2021-44228, CVE-2021-45046) and other vulnerable (CVE-2017-5645, CVE-2019-17571, CVE-2022-23305, CVE-2022-23307 ... ) instances of log4j library. Excellent performance and low memory footprint.
Stars: ✭ 22 (-55.1%)
Mutual labels:  log4j, cve-2021-44228
Log4j-RCE-Scanner
Remote command execution vulnerability scanner for Log4j.
Stars: ✭ 200 (+308.16%)
Mutual labels:  log4j, cve-2021-44228
log4j-shell-poc
A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
Stars: ✭ 1,536 (+3034.69%)
Mutual labels:  log4j, cve-2021-44228
cloudrasp-log4j2
一个针对防御 log4j2 CVE-2021-44228 漏洞的 RASP 工具。 A Runtime Application Self-Protection module specifically designed for log4j2 RCE (CVE-2021-44228) defense.
Stars: ✭ 105 (+114.29%)
Mutual labels:  log4j, cve-2021-44228
log4jscanwin
Log4j Vulnerability Scanner for Windows
Stars: ✭ 142 (+189.8%)
Mutual labels:  log4j, cve-2021-44228
log4j-detector
Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!
Stars: ✭ 622 (+1169.39%)
Mutual labels:  log4j, cve-2021-44228
log4shell-tools
Tool that runs a test to check whether one of your applications is affected by the recent vulnerabilities in log4j: CVE-2021-44228 and CVE-2021-45046
Stars: ✭ 55 (+12.24%)
Mutual labels:  log4j, cve-2021-44228
log4j-cve-2021-44228
Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 Remote Code Execution - log4j (CVE-2021-44228)
Stars: ✭ 58 (+18.37%)
Mutual labels:  log4j, cve-2021-44228
LogMePwn
A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.
Stars: ✭ 362 (+638.78%)
Mutual labels:  log4j, cve-2021-44228
CVE-2021-44228-PoC-log4j-bypass-words
🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Stars: ✭ 760 (+1451.02%)
Mutual labels:  log4j, cve-2021-44228
python-log4rce
An All-In-One Pure Python PoC for CVE-2021-44228
Stars: ✭ 179 (+265.31%)
Mutual labels:  log4j, cve-2021-44228
MC-Log4J-Exploit-Checker
Checks Minecraft, MultiMC, Lunar and Badlion logs folder to see if you've been affected by the exploit!
Stars: ✭ 19 (-61.22%)
Mutual labels:  log4j, log4j-rce
log4jpwn
log4j rce test environment and poc
Stars: ✭ 306 (+524.49%)
Mutual labels:  log4j, cve-2021-44228
nmap-log4shell
Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)
Stars: ✭ 54 (+10.2%)
Mutual labels:  log4j, cve-2021-44228
HackLog4j
《HackLog4j-永恒之恶龙》致敬全宇宙最无敌的Java日志库!Tribute to the most invincible Java logging library in the universe!
Stars: ✭ 161 (+228.57%)
Mutual labels:  log4j, cve-2021-44228
awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
Stars: ✭ 538 (+997.96%)
Mutual labels:  log4j, cve-2021-44228

log4j-log4shell-affected

Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE) for security responders.

We believe it is important to classify the vendors and products between:

  1. Internal risk - what you need to patch first to remove risk internally
  2. External risk - all third/fourth-party vendors that have custody of your data that might've been hacked that you will need to monitor and tackle once you're done patching

Here are the lists:

External Risk - Affected Apps

i.e. all vendors you should worry about if you have data in their environemnt or if they access to your environment

Internal Risk - Affected Components

i.e. software components you might have used in building your products that you should worry if they cause you to be vulnerable

Other useful resources

Lists

Artifacts using log4j

Compromised apps with confirmation

List of responses from various vendors, some affected and some not

Official list maintained by CISA - US Govt

Official list maintained by NCSC - NL govt, high update frequency

Guides how to repsond

A fast and simple guide on what to do to respond to the log4j incident

General incident response guide in case you discover a 3rd party vendor of yours got hacked

Contributing

We are happy to recieve contributions from the community. Contribution guidelines:

  • Please make a PR editing the raw CSV files.
  • Please be sure to include a reference source for each added row (claims without a validated link for source of claim will not be accepted)

About this repo

This repo is maintained to simplify response for enterprises and organizations by separating between:

  1. Internal risk - Software components you need to search for and patch in your products / internal environment
  2. External risk - Third and fourth-party vendors/apps who might've been affected and you should to monitor if your data is in their custody

This list is a community project open for everyone to contribute to and is curated by: Authomize Logo

Our favorite description of the situation

Meme

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].