jdk8u_jdk
tsunami-security-scanner
jdk8u_jdk | tsunami-security-scanner | |
---|---|---|
1 | 4 | |
209 | 8,121 | |
- | 0.5% | |
0.0 | 7.5 | |
about 3 years ago | 5 days ago | |
Java | Java | |
GNU General Public License v3.0 only | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
jdk8u_jdk
-
Log4j RCE Found
Out of the box (at least on my text 1.8 JVM): corbaname, dns, iiop, iiopname, ldap, ldaps, rmi
For full details of how this works, use a vulnerable log4j version, log a simple (bad) lookup, and step through with a debugger for a while.
Sources:
* https://github.com/JetBrains/jdk8u_jdk/blob/master/src/share...
tsunami-security-scanner
- Qualys Community Edition for vuln. scanning?... limitations?
-
Log4j RCE Found
https://github.com/google/tsunami-security-scanner (I bet it would be easy to write a plugin for https://github.com/projectdiscovery/nuclei as well.)
To see if there are injection points statically, I work on a tool (https://github.com/returntocorp/semgrep) that someone else already wrote a check with: https://twitter.com/lapt0r/status/1469096944047779845 or look for the mitigation with `semgrep -e '$LOGGER.formatMsgNoLookups(true)' --lang java`. For the mitigation, the string should be unique enough that just ripgrep works well too.
-
Security and self-hosting, bumping a 7 months old thread
Thanks to you I just reenabled Tsunami https://github.com/google/tsunami-security-scanner. Also had software called something like vuln (blue logo with a yellow eye in the middle) running. but the hard disk of the server died --sadly and I can't remember how it was called.-- https://vuls.io/
-
Awesome Penetration Testing
Tsunami - General purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
What are some alternatives?
jdk8u - https://wiki.openjdk.org/display/jdk8u
logging-log4j1 - Apache log4j1
tsunami-security-scanner-plugins - This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.
awesome-pcaptools - A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
rogue-jndi - A malicious LDAP server for JNDI injection attacks
docker-gvm - Docker container stack for GVM / OpenVAS
nuclei-templates - Community curated list of templates for the nuclei engine to find security vulnerabilities.
scapy - Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
go-cache - An in-memory key:value store/cache (similar to Memcached) library for Go, suitable for single-machine applications.
marshalsec
ZAP - The ZAP core project