log4jscan
A fully automated, accurate, and extensive scanner for finding vulnerable log4j hosts To Use After install you will see this container in the docker tab but will apear as not started and seem not to start and the log will show an error. You must add a url list before running to get a result. The container will have made a folder in the appdata folder. You will need to reset its permissions run the line below from the Unraid terminal chmod -R u-x,go-rwx,go+u,ugo+X /mnt/user/appdata/log4j-scan/ then put a file called urls.txt with each url on a separate line in that location then run the below command After run the container and view the log to see the result post arguments in the template optional arguments can be added to the post arguements (see https://github.com/fullhunt/log4j-scan) -h, --help show this help message and exit -u URL, --url URL Check a single URL. -p PROXY, --proxy PROXY send requests through proxy -l USEDLIST, --list USEDLIST Check a list of URLs. --request-type REQUEST_TYPE Request Type: (get, post) - . --headers-file HEADERS_FILE Headers fuzzing list - . --run-all-tests Run all available tests on each URL. --exclude-user-agent-fuzzing Exclude User-Agent header from fuzzing - useful to bypass weak checks on User-Agents. --wait-time WAIT_TIME Wait time after all URLs are processed (in seconds) - . --waf-bypass Extend scans with WAF bypass payloads. --custom-waf-bypass-payload CUSTOM_WAF_BYPASS_PAYLOAD Test with custom WAF bypass payload. --test-CVE-2021-45046 Test using payloads for CVE-2021-45046 (detection payloads). --dns-callback-provider DNS_CALLBACK_PROVIDER DNS Callback provider (Options: dnslog.cn, interact.sh) - . --custom-dns-callback-host CUSTOM_DNS_CALLBACK_HOST Custom DNS Callback Host. --disable-http-redirects Disable HTTP redirects. Note: HTTP redirects are useful as it allows the payloads to have a higher chance of reaching vulnerable systems.