Support
Explanations

Detecting the Log4j vulnerability with Invicti Standard

This document is for:
Invicti Standard

Invicti Standard can detect whether you have Java applications vulnerable to remote code execution attacks targeting the Log4j library. A fix is already available, so the recommended course of action is to update to Log4j 2.17.0 (or newer) immediately. For further information about Log4j, see Why Log4Shell could be the worst software vulnerability ever and Log4J FAQ.

This document provides a step-by-step guide on how to identify the Log4j vulnerability using Invicti Standard. To detect the vulnerability using Invicti Enterprise, refer to Detecting the Log4j vulnerability with Invicti Enterprise manual.

Whitelisting requirements

Refer to these documents to whitelist the correct IP addresses:

Detecting the Log4j vulnerability with Invicti Standard

To detect the Log4j with Invicti Standard, follow these steps:

Step 1: Configuring a scan policy for the Log4j vulnerability

With the newest version installed on your environment, you can now configure a scan policy to run a security check to identify the Log4j vulnerability in your environment.

How to configure scan policy for the Log4j vulnerability

  • In Invicti Standard select Home > Scan Policy Editor from the main ribbon. A new window will open allowing you to change the settings.

Scan Policy Editor window in Invicti Standard.

  • Select New and enter a name for your new scan policy.
  • In the Security Check Groups' section, double-click Code Evaluation, then check Log4j Code Evaluation (Out of Band).

Setting up custom scan policy with code evaluation for Log4j vulnerability in Invicti Standard.

  • In the Security Checks section, enable the security checks you want.

TIP:

Additional attacks to the headers may extend the scan's duration.

  • Select Apply, then OK to close the Scan Policy Editor window.

Step 2: Scanning your application with the custom scan policy

After you create a custom scan policy to identify Log4j in your environment, you can run a scan.

How to scan your application to detect the Log4j vulnerability

  • Select Home > New in the main ribbon.
  • In Start a New Website or Web Service Scan field, type the URL.

  • In the Scan Policy dropdown, select your custom scan policy.
  • Select Start Scan to launch it.
  • Select No in the pop-up asking if you want to enable Invicti Shark. Enabling it won’t affect the scan results.

Step 3: Reviewing scan results

When Invicti Standard completes the scan, you can see the result in the Issues and Sitemap panels. The Issues panel lists all detected vulnerabilities and other issues.