Log4J Vulnerability Detection Tool - Free Download

Detect Log4J Log4Shell Vulnerabilities

Enterprotect Log4J Scanner is a free vulnerability detection tool designed to identify Log4Shell vulnerabilities (known as CVE-2021-44228 and CVE-2021-45046). This standalone Windows executable (EXE) tool allows users to scan individual computers. It helps users proactively identify and mitigate security risks associated with the Log4Shell Log4J vulnerability.

Screenshot of Enterprotect Standalone Log4Shell Scanner

Disclaimer

Please note that Enterprotect Log4J / Log4Shell Scanner is distributed under the Apache License 2.0, and as such, it comes with no warranties of any kind. Users assume full responsibility for their usage of the tool, and it is recommended to thoroughly review the license terms before using it.

Functionality

Enterprotect Log4J Scanner provides the following features:

  1. System Search: The tool scans the system to locate Java applications that may be affected by Log4J vulnerabilities, specifically targeting the Log4Shell vulnerability.

  2. Vulnerability Detection: For each identified application, Enterprotect Log4J Scanner checks for updates to Log4J that indicate whether the application has been patched to address the Log4Shell vulnerability. The scanner examines the presence of the Log4J class "JndiLookup.class" within the application. If the class is detected and the application has not been updated to Log4J 2.16+ or Log4J 2.12.2+, it is considered vulnerable to Log4Shell.

  3. Scan Results: After completing the scan, Enterprotect Log4J Scanner generates output files in both text (.log) and JSON (.json) formats. These files provide detailed information about the scanned applications, including their paths and vulnerability status.

Usage

To utilize Enterprotect Log4J Scanner and detect Log4J vulnerabilities, follow these steps:

  1. Download: Obtain the Enterprotect Log4J Scanner executable (EXE) file from the official source or the designated download location.

  2. Run the EXE: Double-click the Enterprotect Log4J Scanner EXE file to execute the tool on your Windows computer. Note that administrator privileges are required to ensure access to system resources.

  3. Scanning Process: The scanner will automatically search your system for Java applications containing the Log4J class "JndiLookup.class," which is associated with Log4Shell vulnerabilities. The scanning process may take some time, depending on the size and complexity of the system.

  4. View Results: Once the scan is complete, Enterprotect Log4J Scanner will generate two output files in the same directory as the EXE file. These files include:

    • output.log: A text file providing detailed scan results, including information about the scanned applications, their vulnerability status, and any errors encountered during the process.

    • output.json: A JSON file containing the same information as the text file but in a structured format that can be easily parsed and processed programmatically.

    Open the output.log file using a text editor to review the scan results. It will clearly indicate the status of each scanned application, whether it passed, failed, is unknown, or encountered an error. The paths of vulnerable applications, as well as those with unknown or error status, will be provided in the log file. Additionally, you can programmatically process the output.json file if desired.

By following these steps, you can successfully download, run, and view the results of Enterprotect Log4J Scanner to identify Log4J vulnerabilities and mitigate the Log4Shell exploit effectively. Remember to review the scan results carefully and take appropriate actions to address any identified vulnerabilities.

Scan Results

Each scan performed by Enterprotect Log4J Scanner yields one of the following results:

  • PASS: The scan confirms that all Java applications detected were thoroughly examined, and no vulnerable applications were found.

  • FAIL: One or more vulnerable Java applications were discovered during the scan. Users should review the output files (.log and .json) for the paths of the vulnerable applications. If the scanner encounters any issues while scanning specific applications, those applications will also be listed in the output and JSON files.

  • UNKNOWN: No vulnerable Java applications were detected; however, the scanner was unable to detect all the scanned applications. Users should consult the output files and JSON for the paths of the applications where the scan result couldn't be determined.

  • ERROR: The scanner encountered an error during the scan process and was unable to complete. Users should refer to the output file for detailed information regarding the encountered error.

Requirements

To utilize Enterprotect Log4J Scanner, ensure that the following requirements are met:

  1. The Windows system must have .NET Framework 4.5 or higher installed.

  2. The tool must be executed with administrator privileges to ensure full access to the necessary system resources.

Choose the Right Solution for Your Needs

Free Download

Stand-alone Log4J Detection

Download the Enterprotect Log4Shell Scanner for free and detect Log4J vulnerabilities on your individual computer. This standalone Windows executable (EXE) tool enables you to scan nested JAR files, WAR files, and EAR files effortlessly. Click the button below to begin the download.

Download Log4J Scanner

Free Trial

Organization-Wide Log4J Detection

Choose our complete security solution, Enterprotect 360, for automated and continuous monitoring of Log4Shell and other vulnerabilities. Start a free trial of Enterprotect 360, and our platform will monitor all of your organizations computers, including remote machines, regardless of their location. Ensure comprehensive coverage and protection for your systems. Click the button below to sign up for the free trial.

Sign-up for a Free Trial
 

References

To learn more about the Log4Shell vulnerabilities and their impact, you can refer to the following National Vulnerability Database (NVD) links:

Previous
Previous

Understanding and Defending Your Organization Against the Log4j Vulnerability

Next
Next

3 New Apple Zero-Day Vulnerabilities in WebKit Exploited