log4shell-poc-py
POC for detecting the Log4Shell (Log4J RCE) vulnerability.
Run on a system with python3 python3 log4shell-poc.py
pathToTargetFile
- containing a list of targets (targets are seperated by newlines)InteractionURL
- the endpoint used to monitor out of band data extraction or interactions, e.g: https://github.com/projectdiscovery/interactsh
Example Output
[1] Testing asset: http://
[2] Testing asset: http://
[3] Testing asset: http://
[4] Testing asset: http://
[5] Testing asset: http://
[6] Testing asset: http://
[7] Testing asset: http://
Interaction Results
The example output as seen on the interactor due to a the Log4J vulnerability being found in an asset.
;; ANSWER SECTION:
.
. 3600 IN A
;; AUTHORITY SECTION:
.
. 3600 IN NS ns1.
.
.
. 3600 IN NS ns2.
.