log4j-patch
tsunami-security-scanner
log4j-patch | tsunami-security-scanner | |
---|---|---|
4 | 4 | |
66 | 8,121 | |
- | 0.4% | |
0.0 | 7.5 | |
over 2 years ago | 3 days ago | |
Java | Java | |
Do What The F*ck You Want To Public License | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
log4j-patch
- log4j-patch: Parche no intrusivo para la vulnerabilidad RCE de #log4j2 ðŸ›
-
Warning for people playing on Minecraft servers. This is important!
There is also log4j-patch which might allow you to resolve issues with it.
-
Log4j RCE Found
https://github.com/Glavo/log4j-patch
This is a non-intrusive patch that allows you to block this vulnerability without modifying the program code/updating the dependent. So you can use it to patch third-party programs, such as Minecraft.
The principle of the library is simple: It provides an empty JndiLookup to override the implementation in log4j. Log4j2 can handle this situation and safely disable JNDI lookup.
It is compatible with all versions of log4j2 (2.0~2.15).
tsunami-security-scanner
- Qualys Community Edition for vuln. scanning?... limitations?
-
Log4j RCE Found
https://github.com/google/tsunami-security-scanner (I bet it would be easy to write a plugin for https://github.com/projectdiscovery/nuclei as well.)
To see if there are injection points statically, I work on a tool (https://github.com/returntocorp/semgrep) that someone else already wrote a check with: https://twitter.com/lapt0r/status/1469096944047779845 or look for the mitigation with `semgrep -e '$LOGGER.formatMsgNoLookups(true)' --lang java`. For the mitigation, the string should be unique enough that just ripgrep works well too.
-
Security and self-hosting, bumping a 7 months old thread
Thanks to you I just reenabled Tsunami https://github.com/google/tsunami-security-scanner. Also had software called something like vuln (blue logo with a yellow eye in the middle) running. but the hard disk of the server died --sadly and I can't remember how it was called.-- https://vuls.io/
-
Awesome Penetration Testing
Tsunami - General purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with high confidence.
What are some alternatives?
active-scan-plus-plus - ActiveScan++ Burp Suite Plugin
logging-log4j1 - Apache log4j1
rogue-jndi - A malicious LDAP server for JNDI injection attacks
awesome-pcaptools - A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
jdk8u - https://wiki.openjdk.org/display/jdk8u
docker-gvm - Docker container stack for GVM / OpenVAS
Apache Log4j 2 - Apache Log4j 2 is a versatile, feature-rich, efficient logging API and backend for Java.
scapy - Scapy: the Python-based interactive packet manipulation program & library. Supports Python 2 & Python 3.
go-cache - An in-memory key:value store/cache (similar to Memcached) library for Go, suitable for single-machine applications.
nuclei-templates - Community curated list of templates for the nuclei engine to find security vulnerabilities.
ZAP - The ZAP core project