Skip to content

Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability

Notifications You must be signed in to change notification settings

authomize/log4j-log4shell-affected

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

40 Commits
 
 
 
 
 
 
 
 

Repository files navigation

log4j-log4shell-affected

Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE) for security responders.

We believe it is important to classify the vendors and products between:

  1. Internal risk - what you need to patch first to remove risk internally
  2. External risk - all third/fourth-party vendors that have custody of your data that might've been hacked that you will need to monitor and tackle once you're done patching

Here are the lists:

i.e. all vendors you should worry about if you have data in their environemnt or if they access to your environment

i.e. software components you might have used in building your products that you should worry if they cause you to be vulnerable

Other useful resources

Lists

Artifacts using log4j

Compromised apps with confirmation

List of responses from various vendors, some affected and some not

Official list maintained by CISA - US Govt

Official list maintained by NCSC - NL govt, high update frequency

Guides how to repsond

A fast and simple guide on what to do to respond to the log4j incident

General incident response guide in case you discover a 3rd party vendor of yours got hacked

Contributing

We are happy to recieve contributions from the community. Contribution guidelines:

  • Please make a PR editing the raw CSV files.
  • Please be sure to include a reference source for each added row (claims without a validated link for source of claim will not be accepted)

About this repo

This repo is maintained to simplify response for enterprises and organizations by separating between:

  1. Internal risk - Software components you need to search for and patch in your products / internal environment
  2. External risk - Third and fourth-party vendors/apps who might've been affected and you should to monitor if your data is in their custody

This list is a community project open for everyone to contribute to and is curated by: Authomize Logo

Our favorite description of the situation

Meme

About

Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource for security responders to be able to find and address the vulnerability

Topics

Resources

Stars

Watchers

Forks