Share
## https://sploitus.com/exploit?id=CA8D6F85-3A73-5070-B9A0-3A47FAE2C784
# `log4j-remediation-tools`

> Tools for finding and reproducing the [CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228) `log4j2` vulnerability

## Tools

- [`find-vulnerabilities`](./find-vulnerabilities): determine heuristically whether a running JVM is vulnerable
- [`confirm-vulnerabilities`](./confirm-vulnerabilities): determine with 100% accuracy whether a running JVM is vulnerable

## Usage

Both of these tools scan all running JVM processes on a machine, and produce a CSV report about which processes may be / are vulnerable.

Check out the corresponding READMEs for [`find-vulnerabilities/`](./find-vulnerabilities) and [`confirm-vulnerabilities/`](./confirm-vulnerabilities) for usage details.

### Which tool should I use?

Here are a few tradeoffs to help you determine which tool is right for your use case:

`find-vulnerabilities` is low-risk to run, but has the possibility of missing:

- Cases where a system property is not set on the CLI, e.g. at runtime
- Cases where the JVM has closed the file descriptor for the jar
- Non-standard / patched releases of `log4j2`

`confirm-vulnerabilities` uses the JVM Attach API which:

- May not work if an application explicitly disables this API
- May crash the running JVM due to JVM bugs
- May briefly slow down the running JVM while waiting for JVM pause

## Contributing

This project welcomes feedback and contributions; however, we might be slow to respond to or triage your requests. We appreciate your patience.

## License

This project uses the [MIT license](LICENSE.md).

## Code of conduct

This project has adopted the Stripe [Code of conduct](CODE_OF_CONDUCT.md).