log4j-cve-2021-44228
Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 Remote Code Execution - log4j (CVE-2021-44228) (by lucab85)
log4jscanwin
Log4j Vulnerability Scanner for Windows (by Qualys)
log4j-cve-2021-44228 | log4jscanwin | |
---|---|---|
6 | 4 | |
56 | 154 | |
- | 0.0% | |
3.6 | 1.3 | |
over 2 years ago | about 1 year ago | |
C | ||
MIT License | GNU General Public License v3.0 or later |
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
log4j-cve-2021-44228
Posts with mentions or reviews of log4j-cve-2021-44228.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-01-07.
-
The Bullhorn #41 (Ansible Newsletter) - Happy Moo year 2022!
Ansible Playbook code available (via Github, Galaxy) to download the detector script (v1.2 released 2021-12-20), validate GPG signature, install dependencies, create work directory, run the detector with the right options and get the results.
- GitHub - lucab85/log4j-cve-2021-44228: Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script Remote Code Execution - log4j (CVE-2021-44228)
- Ansible Red Hat detector Remote Code Execution – Log4j (CVE-2021-44228)
log4jscanwin
Posts with mentions or reviews of log4jscanwin.
We have used some of these posts to build our list of alternatives
and similar projects. The last one was on 2022-01-16.
- log4j scanner for subnet
-
Log4 detection by enterprise tools
We're using Qualys free tool https://github.com/Qualys/log4jscanwin and it has a quite detailed output, and as far as I can tell it can also be read from Qualys cloud agent (we don't have it so I don't know how effective it is)
-
Qualys Scans not finding Log4j, but Qualys stand-alone Log4j Vulnerability Scanner does?
Here's the link to the stand-alone scanner: GitHub - Qualys/log4jscanwin: Log4j Vulnerability Scanner for Windows Very much worth having.
-
So how exactly is Log4j supposed to be patched/mitigated on Windows?
This just came out - haven’t tested it yet though - https://github.com/Qualys/log4jscanwin
What are some alternatives?
When comparing log4j-cve-2021-44228 and log4jscanwin you can also consider the following projects:
antsibull - Tooling for building various things related to ansible
incidentresponse
CVE-2021-44228-Scanner - Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228
MacDirtyCow - Example of CVE-2022-46689 aka MacDirtyCow.
CVE-2022-22965 - 🚀 Exploit for Spring core RCE in C [ wip ]
local-log4j-vuln-scanner - Simple local scanner for vulnerable log4j instances
nse-log4shell - Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)
PatchAgainstLog4Shell - This is for patching against Log4Shell in Windows via Powershell