## https://sploitus.com/exploit?id=F523E799-3659-532F-8EED-40AD7F79E752
# Log4j-CVE-2021-44228 scanner playbook
Very simple Ansible playbook that scan the filesystem for JAR files vulnerable to Log4Shell (CVE-2021-44228).
The result is saved in a CSV file in the local system.
## How to run
A value for the name of the CSV file must be passed via the `local_file` variable.
```bash
ansible-playbook --extra-vars "local_file=./jdni_dev.csv" log4j-cve-2021-44228.yml
```