Find Log4j vulnerabilities on Windows

To find out if your windows machine is vulnerable to Apache’s log4j related vulnerabilities, run this command by firing up the Windows PowerShell as an Administrator.

Get-childitem -Path c:\ -Include log4j*.jar -File -Recurse -ErrorAction SilentlyContinue | select Lastwritetime, directory, name | export-csv -append -notypeinformation c.csv

After the scan is complete, it will generate c.csv file at the location where you ran the command.

Replace c:\ with the drives letters you got.

Check the CSV file to see if there are any listings.

If there are, then do the needful, by either updating your software or installing patches or uninstalling the software as you see fit.

Like Love Haha Wow Sad Angry

You Might Also Like

No Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.