https://github.com/dwisiswant0/look4jar
Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?
https://github.com/dwisiswant0/look4jar
golang log4j log4j2 rce security vulnerability
Last synced: 8 months ago
JSON representation
Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?
- Host: GitHub
- URL: https://github.com/dwisiswant0/look4jar
- Owner: dwisiswant0
- License: apache-2.0
- Created: 2021-12-18T11:39:38.000Z (almost 4 years ago)
- Default Branch: master
- Last Pushed: 2022-03-02T15:42:36.000Z (over 3 years ago)
- Last Synced: 2024-05-01T17:25:18.098Z (over 1 year ago)
- Topics: golang, log4j, log4j2, rce, security, vulnerability
- Language: Go
- Homepage:
- Size: 11.7 KB
- Stars: 44
- Watchers: 4
- Forks: 5
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
README
# Look4jar

Look for JAR files that vulnerable to [Log4j RCE](https://logging.apache.org/log4j/2.x/security.html) ([CVE‐2021‐44228](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228))
---
## Objectives
It differs from some other tools that scan for vulnerable remote services by running trigger exploits such as track DNS pingbacks. **Look4jar** tried to find `JndiLookup.class` file in the java archive _(recursively)_, if yet any — then it will look for `log4j2.enableJndiLookup` in `JndiManager.class` file which it deems possibly vulnerable.
## Installation
- Download a prebuilt binary from [releases page](https://github.com/dwisiswant0/look4jar/releases/latest), unpack and run! or:
- If you have **[Go1.16+](https://go.dev/doc/install)** compiler installed & configured:
```console
$ go install dw1.io/look4jar@latest
```
**— or**
Building from source code:
```console
$ git clone git@github.com:dwisiswant0/look4jar.git
$ cd look4jar/
$ go mod tidy
$ go build .
$ ./look4jar -h
```
## Usage
```
look4jar
---
Look for JAR files that vulnerable to Log4j RCE (CVE‐2021‐44228)
@dwisiswant0
Usage:
look4jar -p /path/to/file [OPTIONS...]
Options:
-p, --path Specify EAR/JAR/WAR file/directory to scan recursively
-v, --verbose Verbose mode (default false)
Examples:
look4jar -p /path/to/file.jar
look4jar -p /usr/local/lib -v
```
## Similar Projects
- [yahoo/check-log4j](https://github.com/yahoo/check-log4j)
## License
**Look4jar** is distributed under Apache License v2.0. See `LICENSE`.