Overview
scan4all includes native Go POC modules for detecting critical vulnerabilities in enterprise applications. These POCs are compiled into the binary for maximum performance and reliability.High Performance
Native Go code executes faster than interpreted templates
Critical CVEs
Focus on high-impact vulnerabilities requiring immediate attention
Enterprise Targets
Weblogic, Jenkins, Exchange, VMware, and more
Custom Logic
Complex detection logic not possible in YAML
Supported Systems
Enterprise Middleware
- Oracle Weblogic
- Apache Tomcat
- Spring Framework
- Jenkins
Weblogic Vulnerabilities (11 POCs)
| CVE | Severity | Description |
|---|---|---|
| CVE-2014-4210 | Medium | SSRF vulnerability |
| CVE-2017-3506 | Critical | WLS-WSAT RCE |
| CVE-2017-10271 | Critical | WLS-WSAT deserialization RCE |
| CVE-2018-2894 | High | Arbitrary file upload |
| CVE-2019-2725 | Critical | WLS9-ASYNC deserialization RCE |
| CVE-2019-2729 | Critical | WLS9-ASYNC deserialization RCE |
| CVE-2020-2883 | Critical | IIOP/T3 deserialization RCE |
| CVE-2020-14882 | Critical | Console authentication bypass |
| CVE-2020-14883 | Critical | Console RCE |
| CVE-2021-2109 | High | Unauthorized JNDI access |
Example: CVE-2020-14882
POC Directory Structure
Detection Workflow
Execution Logic
Flow Diagram
Special Detection Categories
Log4Shell Detection
Log4Shell Detection
Comprehensive Log4j JNDI injection detection:Features:Callback Detection:
- Multiple payload variations
- Header injection testing (X-Forwarded-For, User-Agent, etc.)
- POST parameter injection
- Struts2 specific patterns
- DNS callback verification
Fastjson RCE Detection
Fastjson RCE Detection
Multiple Fastjson versions and bypass techniques:Detected Versions:
- 1.2.24 and earlier
- 1.2.47 and earlier
- 1.2.62 and earlier
- 1.2.66 and earlier
Microsoft Exchange
Microsoft Exchange
ProxyLogon/ProxyShell detection:CVE-2021-26855 (ProxyLogon):
Shiro RememberMe
Shiro RememberMe
Shiro deserialization with key detection:Key Dictionary:Detection:
OA System Coverage
Chinese OA Systems
- Seeyon (致远OA)
- Tongda (通达OA)
- Other OA
10 Vulnerability POCs:
| POC | Type |
|---|---|
| SeeyonFastjson | RCE |
| SessionUpload | File Upload |
| CNVD-2019-19299 | File Upload |
| CNVD-2020-62422 | File Read |
| CNVD-2021-01627 | SQL Injection |
| CreateMysql | SQL Injection |
| DownExcelBeanServlet | Info Leak |
| GetSessionList | Session Disclosure |
| InitDataAssess | Auth Bypass |
| ManagementStatus | Info Leak |
Network Protocol Checks
Microsoft Protocols
Microsoft Protocols
SMB:
- MS17-010 detection (EternalBlue)
- SMBGhost (CVE-2020-0796)
- Port 135 interface enumeration
- Remote interface discovery
- NetBIOS enumeration
- Workstation information
Apache Zookeeper
Apache Zookeeper
Unauthorized access detection:
Configuration
Automatic Execution
Go POCs execute automatically when matching fingerprints are detected:Enable Log4j Scanning
Filter by Technology
Performance
Native Speed
Compiled Go code executes 10-100x faster than interpreted templates
Low Overhead
Minimal memory footprint and CPU usage
Concurrent Execution
Multiple POCs run in parallel per target
Early Detection
Critical vulns detected first in scan workflow
Output Format
URL [Status] [Technology] [Vulnerability|Details] [Final URL]
Development
See Custom POCs for detailed information on creating Go POC modules.Quick Example
Best Practices
Specific Detection
Use precise vulnerability markers to avoid false positives
Error Handling
Always handle network errors gracefully
Logging
Report findings with sufficient context
Performance
Keep POCs fast - they run on every matching target
Related Resources
Custom POCs
Learn to develop your own Go POC modules
Xray POCs
YAML-based POC system
Fingerprinting
Technology detection system
Development Guide
Extend scan4all capabilities