Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ncsc-nl/log4shell
Operational information regarding the log4shell vulnerabilities in the Log4j logging library.
https://github.com/ncsc-nl/log4shell
cve-2021-4104 cve-2021-44228 cve-2021-45046 cve-2021-45105 log4j log4shell vulnerability
Last synced: 3 months ago
JSON representation
Operational information regarding the log4shell vulnerabilities in the Log4j logging library.
- Host: GitHub
- URL: https://github.com/ncsc-nl/log4shell
- Owner: NCSC-NL
- Archived: true
- Created: 2021-12-12T06:27:24.000Z (about 3 years ago)
- Default Branch: main
- Last Pushed: 2022-06-15T23:59:35.000Z (over 2 years ago)
- Last Synced: 2024-09-26T04:43:04.988Z (3 months ago)
- Topics: cve-2021-4104, cve-2021-44228, cve-2021-45046, cve-2021-45105, log4j, log4shell, vulnerability
- Language: Python
- Homepage:
- Size: 7.73 MB
- Stars: 1,892
- Watchers: 69
- Forks: 606
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Log4shell vulnerabilities (CVE-2021-44228, CVE-2021-45046, CVE-2021-4104, CVE-2021-45105)
This repo contains operational information regarding the Log4shell vulnerability in the Log4j logging library.
Especially CVE-2021-44228 / CVE-2021-45046 and also covers CVE-2021-4104 / CVE-2021-45105. For additional information see:* [NCSC-NL advisory](https://www.ncsc.nl/actueel/advisory?id=NCSC-2021-1052)
* [MITRE](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228)
* [EU CSIRT network members advisories, maintained by ENISA](https://github.com/enisaeu/CNW/tree/main/log4shell)
* [Log4shell vulnerability overview](https://github.com/NCSC-NL/log4shell/blob/main/log4shell_en.png)For affected organisations and CISOs searching for concise mitigation guidance, the [Log4Shell for OES - Full presentation slides for CISOs and techies](https://github.com/NCSC-NL/log4shell/blob/main/detection_mitigation/Log4Shell%20for%20OES.pdf) describes the vulnerability and explains **all steps** necessary to successfully mitigate the vulnerability (**patching is not enough**).
## Repository contents
| Directory | Purpose |
|:-----------------------------------|:--------|
| [hunting](hunting/README.md) | Contains info regarding hunting for exploitation |
| [iocs](iocs/README.md) | Contains any Indicators of Compromise, such as scanning IPs, etc |
| [detection & mitigation](detection_mitigation/README.md) | Contains info regarding detection and mitigation, such as regexes for detecting scanning activity and more |
| [scanning](scanning/README.md) | Contains references to methods and tooling used for scanning for the Log4j vulnerability |
| [software](software/README.md) | Contains a list of known vulnerable and not vulnerable software |
| [tools](tools/README.md) | Contains a list of tools for automatically parsing info on this repo |**Please note that these directories are not complete, and are currently being expanded.**
**NCSC-NL has published a HIGH/HIGH advisory for the Log4j vulnerability. Normally we would update the HIGH/HIGH advisory for vulnerable software packages, however due to the extensive amounts of expected updates we have created a list of known vulnerable software in the software directory.**
## Contributions welcome
If you have any additional information to share relevant to the Log4j vulnerability, please feel free to open a Pull request. New to this? [Read how to contribute in GitHub's documentation](https://docs.github.com/en/repositories/working-with-files/managing-files/editing-files#editing-files-in-another-users-repository).
### Hall of fame
We would like to thank every single one of you that contributed to our GitHub page.
NCSC-NL believes the GitHub page is a succes and you made that possible.
Below we present a very incomplete list of contributants we consider the repository's hall of fame:* [ANSSI](https://www.ssi.gouv.fr/en/)
* [BSI/CERT-Bund](https://www.bsi.bund.de/EN/Topics/IT-Crisis-Management/CERT-Bund/cert-bund_node.html)
* [CERT-EU](https://cert.europa.eu/cert/plainedition/en/cert_about.html)
* [Cybersecurity & Infrastructure Security Agency CISA](https://www.cisa.gov/about-cisa)
* [DCSC](https://www.defensie.nl/onderwerpen/cyber-security/dcsc)
* [SURFcert](https://wiki.surfnet.nl/pages/viewpage.action?pageId=11063492)
* [SK-CERT](https://www.sk-cert.sk/en/about-us/index.html)
* [Z-CERT](https://www.z-cert.nl/)* @DFFSpace
* @tintinhamans
* @milankowww
* @MrSeccubus
* @Goldshop
* @RemkoSikkema
* @MetzieNL
* @RobinFlikkema
* @lucasjellema
* @iglocska