CVE-log4j CheckMK plugin

Overview

CVE-2021-44228-log4j discovery (Download the MKP package)

This plugin discovers vulnerable files for the CVE-2021-44228-log4j issue. To discover this files it uses the CVE-2021-44228-Scanner from logpresso

The scanner (and so the plugin) can discover the following log4j issues

Note: Included in this package is the scanner for Linux and Windows in version 2.7.1 (2022-01-02)

You will find the release notes/latest version for the logpresso scanner here logpresso CVE-2021-44228-Scanner Releases

Note: here you can Download the MKP package for CMK 1.6, this might not be always on the same level as the version for CMK 2.0.

Note: you will find always the latest version here

To use this check you need to deploy the scanner and the plugin for your destination platform. You can do this via the agent bakery (Setup > Agents> Windows, Linux, Solaris, AIX > Agent rules > CVE-2021-44228-log4j). Here you can also configure some options for the scanner (see WATO bakery).

Note: only Linux and Windows is implemented for this bakery plugin. If you need this for AIX/Solaris have a look at the contribution guidelines

Note: If you have created (baked) a new agent package you need to redeploy the agent (automatic update/software deployment)

If you have any issues or using the RAW edition of CMK or have a platform that is not supported by the bakery have a look at the how to information. There you will also find some information whats going on under the hood.


Check Info:

  • service: creates the service CVE-2021-44228-log4j

  • state:
    critical

    • if a (potentially) vulnerable file is found
    • if an error is found (from the agent plugin or the scanner)

    warning

    • if a file state is mitigated is found
    • if a file is skipped by the scanner


  • perfdata (if avilable):
    • Vulnerable files
    • Potentially vulnerable files
    • Mitigated files
    • Files sskipped
    • Files scanned
    • Directories scanned
    • Run time
    • Errors (agent plugin or scanner)

Want to contribute?

Nice ;-) Have a look at the contribution guidelines

Sample output

Note: in the service details you will find the raw output from the scanner

sample output

Sample output details

(sample details)

Sample syslog events in CMK event console

(sample syslog events in CMK event console)

WATO options check plugin

WATO options check plugin

WATO bakery Linux

WATO bakery Linux

WATO bakery Windows

WATO bakery Windows

You might also like...
Providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-44228) in their AWS account.
Providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-44228) in their AWS account.

We are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-44228) in their AWS account. The script enables security teams to identify external-facing AWS assets by running the exploit on them, and thus be able to map them and quickly patch them

Log4j command generator: Generate commands for CVE-2021-44228
Log4j command generator: Generate commands for CVE-2021-44228

Log4j command generator Generate commands for CVE-2021-44228. Description The vulnerability exists due to the Log4j processor's handling of log messag

log4j-tools: CVE-2021-44228 poses a serious threat to a wide range of Java-based applications

log4j-tools Quick links Click to find: Inclusions of log4j2 in compiled code Calls to log4j2 in compiled code Calls to log4j2 in source code Overview

Scans for Log4j versions effected by CVE-2021-44228

check_mkExtension to check for log4j2 CVE-2021-44228 This Plugin wraps around logpresso/CVE-2021-44228-Scanner (Apache License 2.0) How it works Run i

A scanner and a proof of sample exploit for log4j RCE CVE-2021-44228

1.Create a Sample Vulnerable Application . 2.Start a netcat listner . 3.Run the exploit . 5.Use jdk1.8.0_20 for better results . Exploit-db - https://

An automated header extensive scanner for detecting log4j RCE CVE-2021-44228

log4j An automated header extensive scanner for detecting log4j RCE CVE-2021-44228 Usage $ python3 log4j.py -l urls.txt --dns-log REPLACE_THIS.dnslog.

A script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks

Log4j dork scanner This is an auto script to search, scrape and scan for Apache Log4j CVE-2021-44228 affected files using Google dorks. Installation:

open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability
open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability

CVE-2021-44228-log4jVulnScanner-metasploit open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability pre

CVE-2021-44228 log4j 2.x rce漏洞检测工具
CVE-2021-44228 log4j 2.x rce漏洞检测工具

#1 使用说明 CVE-2021-44228 log4j 2.x rce漏洞检测工具,对目标链接发起get请求并利用dnslog探测是否有回显 $ python3 log4j-scan.py -h

Releases(20220205.v0.1.2)
  • 20220205.v0.1.2(Feb 14, 2022)

    • Scanner: changed to version 2.9.2
    • Bakery/WATO:
      • added option --throttle to limit CPU usage by max. # of files to scan per second
      • added option -Xmx to limit memory usage
      • removed option --force-fix/--backup-path
    • Agent plugin:
      • added additional CVEs for Log4j 1 (CVE-2022-23307, CVE-2022-23305, CVE-2022-23302 and CVE-2019-17571)
      • added Warn/Crit based on CVSS score
      • added CVE Description/Comment to service details
      • changed defaults for WARN/CRIT of affected files form (1, 1) to (None, None)
      • fixed missing comment in CVE data (THX to doc[at]snowheaven[dot]de)
    • WATO:
      • added Monitoring state for CVE not found in agent data
      • changed options Scan for logback and Scan for log4j 1 enabled by default for new agent plugin rules
    • Inventory
      • added entry's for CVE-2022-23307, CVE-2022-23305, CVE-2022-23302 and CVE-2019-17571

    Note: before updating to this version, untick "Fix files and backup" option in the agent rules.

    Source code(tar.gz)
    Source code(zip)
  • 20220125.v0.1.0(Feb 5, 2022)

    • CHECK: added check plugin with the CVE id as item

    • BAKERY: added option --exclude-pattern to the Exclude paths section

    • INVENTORY: extended report for additional log4j/logback CVEs

    • WATO:

      • added options for per CVE check
      • added discovery rule for per CVE check plugin
      • added rules for inventory plugins
      • changed display name (again) from 'CVE scanner for log4j (CVE-2021-44228-log4j)' to 'log4j CVE scanner (CVE-2021-44228-log4j)'
      • enabled 'attach_report_to_output' in "reporting" by default for new rules
    • METRICS: added metrics/graph/perfometer for files_affected

    • How To:

      • added "Inventory plugins", "Check plugin cve_2021_44228_log4j_cves" and "Scanner options implemented in the bakery" sections in "Use with the enterprise/free edition of CMK"
      • updated "The config file for cve_44228_log4j agent plugin"

    Note: before installing the update untick the "Exclude paths" option in the agent rules and bake the agent. After the update you can reconfigure the "Exclude paths" option.

    To use the new check plugin and the CVE inventory you need to enable "Enable reporting" -> "Send report to checkmk" in the bakery plugin rules. Whether a file is affected by a specific CVE and the additional information in the inventory is based solely on the log4j/logback version reported by the Logpresso scanner. It says nothing about whether the CVE is exploitable or not.

    Source code(tar.gz)
    Source code(zip)
  • 20220115.v0.0.9(Jan 25, 2022)

    • added inventory for logpresso report
    • changed scanner version to 2.7.2 (2022-01-11)
    • WATO added option to add the logpresso report to the cmk inventory instead of reporting to file/directory
    • WATO moved reporting from file option "Name of the file to report to" to "Append results to log file" (it's technically the same scanner option)
    • WATO added options for inventory plugin

    Note: before updating to v0.0.9 untick "Enable file reporting" in your agent rules. After updating you can reenable them. "Name of the file to report to" is moved to "Append results to log file"

    Source code(tar.gz)
    Source code(zip)
  • 20220111.v0.0.8a(Jan 13, 2022)

    • added PLUGIN_TIMEOUT to the config file
    • added BAKERY_VERSION to the config file (for debugging)
    • added warn on missing agent output (see WATO)
    • added inventory plugin and view for reporting/sorting/filtering etc.
    • added option to exclude files (bulk)
    • changed check parse function made more robust on unexpected input
    • changed windows script reading variables from file
    • changed windows script timeout handling to match Linux script version
    • changed WATO display names to CVE scanner for log4j (CVE-2021-44228-log4j)
    • changed "Silent output" to enabled by default for new WATO rules
    • changed handling of output of values to make it "sortable"
    • fixed on Linux scanner got not killed on timeout by the agent
    • fixed run_time missing on service info (THX to doc[at]snowheaven[dot]de)
    • fixed missing newline on plugin section header output in Linux script

    Known issues

    Source code(tar.gz)
    Source code(zip)
  • 20220102.v0.0.7(Jan 3, 2022)

    From the changelog

    • changed logpresso scanner to version 2.7.1
    • added bakery option for bulk exclude (--exclude-config)
    • added bakery option for bulk search path (-f)
    • added bakery option for append reporting to file (--json-log-path/--csv-log-path)
    • added bakery option for change syslog facility (--syslog-facility)
    • added bakery option for enable rfc5424 syslog message format (--rfc5424), fixes broken syslog message in CMK event console

    After updating to this version you will need to reconfigure your bakery rules.

    Source code(tar.gz)
    Source code(zip)
compact and speedy hash cracker for md5, sha1, and sha256 hashes

hash-cracker hash cracker is a multi-functional and compact...hash cracking tool...that supports dictionary attacks against three kinds of hashes: md5

Abdullah Ansari 3 Feb 22, 2022
The Multi-Tool Web Vulnerability Scanner.

🟥 RapidScan v1.2 - The Multi-Tool Web Vulnerability Scanner RapidScan has been ported to Python3 i.e. v1.2. The Python2.7 codebase is available on v1

skavngr 1.3k Dec 31, 2022
Tenssens framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources.

Tenssens framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources.

Md. Nur habib 31 Oct 21, 2022
ProxyShell POC Exploit : Exchange Server RCE (ACL Bypass + EoP + Arbitrary File Write)

ProxyShell Install git clone https://github.com/ktecv2000/ProxyShell cd ProxyShell virtualenv -p $(which python3) venv source venv/bin/activate pip3 i

Poming huang 312 Dec 09, 2022
Cobalt Strike < 4.4 dos CVE-2021-36798

CVE-2021-36798 CVE-2021-36798 Cobalt Strike 4.3 dos 用法 python3 CVE-2021-36798.py BeaconURL 打瘫Cobalt Strike 只需要一个包 已测试 4.3 4.2 参考: https://labs.sent

37 Nov 09, 2022
The self-hostable proxy tunnel

TTUN Server The self-hostable proxy tunnel. Running Running: docker run -e TUNNEL_DOMAIN=Your tunnel domain -e SECURE=True if using SSL ghcr.io/to

Tom van der Lee 2 Jan 11, 2022
An OSINT tool that searches for devices directly connected to the internet (IoT) with a user specified query. It returns results for Webcams, Traffic lights, Refridgerators, Smart TVs etc.

An OSINT tool that searches for devices directly connected to the internet (IoT) with a user specified query. It returns results for Webcams, Traffic

Richard Mwewa 48 Nov 20, 2022
A small Python Script To get all levels of subdomains from a list

getlevels A small Python Script To get all levels of subdomains Easily get 1st level, 2nd level, 3rd level, 4th level .... nth level subdomains Usag

9 Feb 15, 2022
Ethereum transaction decoder (community version).

EthTx Community Edition Community version of EthTx transaction decoder Local environment For local instance, you need few things: Depending on your di

240 Dec 21, 2022
A TCP Backdoor made in python

Tracey-Backdoor A Reverse Shell Backdoor made in python OOP. It supposed to work in Windows and Linux OS Functions: Reverse Connection Send Reverse TC

13 Oct 15, 2022
Create a secure tunnel from a custom domain to localhost using Fly and WireGuard.

Fly Dev Tunnel Developers commonly use apps like ngrok, localtunnel, or cloudflared to expose a local web service at a publicly-accessible URL. This i

170 Dec 11, 2022
Chrome Post-Exploitation is a client-server Chrome exploit to remotely allow an attacker access to Chrome passwords, downloads, history, and more.

ChromePE [Linux/Windows] Chrome Post-Exploitation is a client-server Chrome exploit to remotely allow an attacker access to Chrome passwords, download

Finn Lancaster 3 Oct 05, 2022
Driver Buddy Reloaded is an IDA Pro Python plugin that helps automate some tedious Windows Kernel Drivers reverse engineering tasks.

Driver Buddy Reloaded Quickstart Table of Contents Installation Usage About Driver Buddy Reloaded Finding DispatchDeviceControl Labelling WDM & WDF St

Paolo 'VoidSec' Stagno 199 Jan 04, 2023
The backend part of the simple password manager project made for the creative challenge.

SimplePasswordManagerBackend The backend part of the simple password manager project. Your task will be to showcase your creativity on our channel by

The Coding Jungle 5 Dec 28, 2021
Brute force attack tool for Azure AD Autologon/Seamless SSO

Brute force attack tool for Azure AD Autologon

nyxgeek 89 Jan 02, 2023
NS-Defacer: a auto html injecter, In other words It's a auto defacer to deface a lot of websites in less time

Overview NS-Defacer is a auto html injecter, In other words It's a auto defacer

NightSec 10 Nov 19, 2022
A piece of software that shows a traceroute of a URL redirect path

Tracing URL redirects has never been easier! Usage • Download 🚩 Use Cases To see where an affiliate link ends up To see what affiliate network is bei

41 Nov 22, 2022
GDID (Google Dorks for Information Disclosure)

GDID (Google Dorks for Information Disclosure) Script made for your recon automation in Bug Bounty or Pentest. It will help you to find Information Di

Nischacid 5 Mar 10, 2022
Undetectable Keylogger that reports to Discord

FUD Keylogger That Reports To Discord This python script will capture all of the keystrokes within a given time frame and report them to a Discord Ser

Dimitris Kalopisis 36 Dec 20, 2022