Professional
This is a simple fork of James Kettle's excellent Collaborator Everywhere, with the injection parameters changed to payloads for the critical log4j CVE-2021-44228 vulnerability. This extension only works on in-scope traffic, and works by injecting headers into your proxy traffic with log4j exploits.
To avoid false positives with pingbacks such as with DNS requests made from host regex matching, and to potentially bypass filters, the ${lower:x} pattern is used in the DNS request to establish confidence that there is some kind of of jdni lookup happening - if this matches, it will set the confidence to certain.
To use it, simply install the plugin and browse the target website. Findings will be presented in the 'Issues' tab. You can easily customise injected payloads by editing /resources/injections
A Burp Professional License is required.
Tool developed by the Claranet Cybersecurity CST Team.
Author |
Author
Rob Jepson, Claranet Cybersecurity CST |
---|---|
Version |
Version
1.0 |
Rating |
Rating |
Popularity |
Popularity |
Last updated |
Last updated
16 December 2021 |
Estimated system impact |
Estimated system impact
Overall impact: Low
Memory
Low
CPU
Low
General
Low
Scanner
Low
|
You can install BApps directly within Burp, via the BApp Store feature in the Burp Extender tool. You can also download them from here, for offline installation into Burp.
|
You can view the source code for all BApp Store extensions on our GitHub page. |
|
Follow @BApp_Store on Twitter to receive notifications of all BApp releases and updates. |
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.
Please note that extensions are written by third party users of Burp, and PortSwigger Web Security makes no warranty about their quality or usefulness for any particular purpose.