Share
## https://sploitus.com/exploit?id=F523E799-3659-532F-8EED-40AD7F79E752
# Log4j-CVE-2021-44228 scanner playbook

Very simple Ansible playbook that scan the filesystem for JAR files vulnerable to Log4Shell (CVE-2021-44228).

The result is saved in a CSV file in the local system.

## How to run

A value for the name of the CSV file must be passed via the `local_file` variable.

```bash
ansible-playbook --extra-vars "local_file=./jdni_dev.csv" log4j-cve-2021-44228.yml
```