Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Recursive depth-first Deep inspection of EAR/WAR/JAR #21

Open
stefan123t opened this issue Dec 30, 2021 · 1 comment
Open

Recursive depth-first Deep inspection of EAR/WAR/JAR #21

stefan123t opened this issue Dec 30, 2021 · 1 comment
Labels
help wanted Extra attention is needed

Comments

@stefan123t
Copy link

Given an EAR file a.ear containing amongst others eg. a WAR file b.war which again contains a JAR file named c.jar which may contain a repackaged / rebundled version of the susceptible JndiLookup/JndiContextSelector.classes make the script recurse into a.ear to unpack b.war and then c.jar to generate the hashes for comparison of the class files.

Ie. can the script run a recursive, depth-first search to find log4j or the suspected Class files in any packaged EAR/WAR/JAR combination our fellow developers came/come up with when developing and adding dependencies to their application stack of libraries ?

I would like to vote for such a deep inspection feature as I cannot get most other frameworks python3, Go based to run on the Servers for lack of language support.

Many thanks

@rubo77
Copy link
Owner

rubo77 commented Dec 30, 2021

Go for it!

I'll accept a pull request

@rubo77 rubo77 added the help wanted Extra attention is needed label Jan 1, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
help wanted Extra attention is needed
Projects
None yet
Development

No branches or pull requests

2 participants