cisagov / log4j-scanner

log4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.
1.28k stars 215 forks source link

Added Custom IP Callback Option #28

Closed ryansisco closed 1 year ago

ryansisco commented 2 years ago

Custom IP Callback

I've added the following command: --custom-ip-callback-host

Purpose

Different orgs may be against making DNS changes or using a 3rd Party provider to scan for exploits. This will allow you to run your own instance of netcat or equivalent and receive responses from vulnerable hosts to your IP.

Code Changes

Naming conventions and styling have been matched to original author. Some variables have been changed from dns specific to generic as they may now be holding an IP address. README.md has been updated.

Differences in Functionality

Adding this functionality requires removing the hostname from the payload when using this parameter. Tools such as netcat will be able to provide you with the IP addresses of the inbound connections.

When using this parameter the CVE-2021-45046 test will not function as this requires DNS. The script will output an error informing the user of the problem so its made clear. Additionally, the jndi:dns payload will not be successful, but with rmi and ldap functioning properly any vulnerable system will likely report correctly.

genericcontributor commented 1 year ago

Sorry for the gross delay and thank you for contributing!