Skip to content

OlafHaalstra/log4jcheck

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Log4j CVE-2021-44228 checker

Multithreaded checks a list of URLs with POST and GET requests in combination with parameters.

Heavily inspired by NortwaveSecurity version.

Set-up

URLs to check

The list of URLs to check should be in the following format (csv):

description,URL,method,parameters
production,example.com/login,POST,"username,password"
staging,example.com/search,GET,"q"
development,example.com/,GETNP,""

This will subsequently run a POST request on example.com/login where the following raw body is posted: username={jndi:ldap...}&password={jndi:ldap...}

Similarly, it will run the following GET request: example.com/search?q={jndi:ldap...}.

Alternatively you can specify GETNP (GET No Parameters) to do the GET the url with the payload appended: example.com/new/{jndi:ldap...}.

Additionally the payload is also inserted in the User-Agent, Referer, X-Forwarded-For, Authentication headers to increase the chances for a hit.

If you want to check URLs for both GET, POST or GETNP, please duplicate the entry in the CSV.

Canary Token

To set-up without any prior configurations you can use https://canarytokens.org/generate and create a Log4Shell CanaryToken:

Canary Tokens

Alternatively, you can set-up your own DNS server.

Running the script

Install dependencies by using pip install-r requirements.txt. Edit the script to change the following line to your preferred canary token:

usage: log4jcheck.py [-h] -f FILE -u URL [-w WAIT] [-t TIMEOUT] [-p PREFIX] [-q THREADS] [-d DONE]

optional arguments:
  -h, --help            show this help message and exit
  -f FILE, --file FILE  The CSV filename containing the URLs
  -u URL, --url URL     DNS subdomain URL on which th callback is performed
  -w WAIT, --wait WAIT  Number of seconds to wait before next request (default: 1)
  -t TIMEOUT, --timeout TIMEOUT
                        HTTP timeout in seconds to use (default: 5)
  -p PREFIX, --prefix PREFIX
                        Type of prefix, see prefixes_injects for options. (default: 0, options 0-3)
  -q THREADS, --threads THREADS
                        Number of threads to distribute the work
  -d DONE, --done DONE  File where we can keep track of items that are done

Generate the folder: /run/logs to output the logs to. Here you can track the progress, nothing will be send to stdout.

Now the script can be run, pointing the script to the prior created CSV with URLs to check.

python3 .\log4jcheck.py --file .\urls-example.csv --threads 2 --url "L4J.ujz5sgvgo7xuvn03ft9qrws5w.canarytokens.com/a" -w 0 -t 1

Check if the token has been triggered after the script has been completed. You will be able to cross correlate which application triggered based on the generated UUID4 in combination with the injected parameter, e.g.: 40852c3b-2d6b-4bd5-a91f-4416aa730619-username.

Testing

Tested against log4shell-vulnerable-app. Modify the MainControll.java as follows:

package fr.christophetd.log4shell.vulnerableapp;


import org.springframework.web.bind.annotation.GetMapping;
import org.springframework.web.bind.annotation.PostMapping;
import org.springframework.web.bind.annotation.RequestHeader;
import org.springframework.web.bind.annotation.RequestBody;
import org.springframework.web.bind.annotation.RequestParam;
import org.springframework.web.bind.annotation.RestController;

import org.apache.logging.log4j.LogManager;
import org.apache.logging.log4j.Logger;

@RestController
public class MainController {

    private static final Logger logger = LogManager.getLogger("HelloWorld");

    @GetMapping("/")
    public String index(@RequestHeader("X-Api-Version") String apiVersion) {
        logger.info("Received a request for API version " + apiVersion);
        return "Hello, world!";
    }

    @GetMapping("/test")
    public String testGet(@RequestParam String test) {
        logger.info("Received a request for test " + test);
        return "Test world!";
    }

    @PostMapping("/test")
    public String test(@RequestBody String test) {
        logger.info("Received a request for test " + test);
        return "Test world!";
    }

}

Compile and run:

gradle bootJar --no-daemon
java -jar .\build\libs\log4shell-vulnerable-app-0.0.1-SNAPSHOT.jar

Run the log4jcheck with the following urls.csv file:

description,URL,method,parameters
test,http://localhost:8080/test,POST,"test"
test,http://localhost:8080/test,GET,"test"

The following information should appear in the canary token log: Log input

Coverage:

The following HTTP headers are covered:

  • X-Api-Version
  • User-Agent
  • Referer
  • X-Druid-Comment
  • Origin
  • Location
  • X-Forwarded-For
  • Cookie
  • X-Requested-With
  • X-Forwarded-Host
  • Accept

For each injection, the following JNDI prefixes are possible:

  • 0: jndi:dns
  • 1: jndi:${lower:l}${lower:d}ap
  • 2: jndi:rmi
  • 3: jndi:ldap

DISCLAIMER

Note that the script only performs checks the: User Agent and any parameters you specify to either the POST or GET request. This will cause false negatives in cases where other headers, missed input fields, etcetera need to be targeted to trigger the vulnerability. Feel free to add extra checks to the script.

License

Log4jcheck is open-sourced software licensed under the MIT license.

About

Check list of URLs against Log4j vulnerability CVE-2021-44228

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages