Success on the 3rd attempt in getting log4j/log4shell remote command execution security vulnerability scanner developed by Adil Soybali to run without HTTPX error message
Subject: Success on the 3rd attempt in getting log4j/log4shell remote command execution security vulnerability scanner developed by Adil Soybali to run without HTTPX error message
Good day from Singapore,
The problem is of course, I was using httpx from the wrong software developer. I had tried to use httpx from https://www.python-httpx.org/, which is wrong. You need to use httpx from the correct software developer, which is https://github.com/projectdiscovery/httpx
At present, there are 2 known different software developers for httpx. The wrong one to use is from https://www.python-httpx.org/. The correct one to use is from https://github.com/projectdiscovery/httpx
There is no programming bug/error with the linux shell script log4j-rce-scanner.sh in the log4j remote command execution security vulnerability scanner developed by Adil Soybali, a security researcher. I have briefly and quickly glanced through the programming code. This is a linux tool and must be installed and run on a Linux machine.
Uninstall httpx from https://www.python-httpx.org
$ sudo pip uninstall httpx
Install httpx from software developer projectdiscovery.
$ wget https://github.com/projectdiscovery/httpx/releases/download/v1.1.4/httpx_1.1.4_linux_amd64.zip
$ unzip httpx_1.1.4_linux_amd64.zip
$ sudo mv httpx /usr/local/bin
END
====
Mr. Turritopsis Dohrnii Teo En Ming, 43 years old as of 18 Dec 2021, is a TARGETED INDIVIDUAL living in Singapore. He is an IT Consultant with a Systems Integrator (SI)/computer firm in Singapore. He is an IT enthusiast.
REFERENCES
===========
[1] https://www.mail-archive.com/log4j-user@logging.apache.org/msg18049.html
[2] https://pastebin.com/raw/FpQBW4Vp
Comments
Post a Comment