Log4Shell - Advisory - Resource & Cheat Sheet

Log4Shell - Advisory - Resource & Cheat Sheet

On December 9, 2021, A critical remote code execution vulnerability impacting at least Apache Log4j 2 (versions 2.0 to 2.14.1) was recently announced by Apache. This vulnerability is designated by Mitre as CVE-2021-44228 with the highest severity rating of 10.0. The vulnerability is also known as Log4Shell or LogJam by security researchers. If exploited, this vulnerability allows adversaries to potentially take full control of the impacted system.Log4j 2 is a commonly used open-source third-party Java logging library used in software applications and services. Big Thanks to @SwitHak for all the Advisory Maintenance. Apart from We kindly request to everyone, (Individual, team, Organisation, or Firm) comment down the link of Advisory or Resource (Tools/Scripts) that needs to be added. 

Apache Log4j RCE vulnerability is much bigger than what we think because Log4j is been used everywhere. In 2015, Java says that Java has over 10 million developers and running on 56 billion devices globally. 


Resources for Log4j Remote Code Execution Vulnerability



  • Log4j-detect - Simple Python 3 script to detect the "Log4j" Java library vulnerability (CVE-2021-44228) for a list of URLs with multithreading.

  • log4shell-detector - Python-based scanner/detector for Log4Shell exploitation attempts.

  • Logout4Shell - One of the best tool ..

    Support the originator by clicking the read the rest link below.