关联漏洞
介绍
# CVE-2021-44228-Demo
This project for prove and testing zero-day log4j exploit
# verify dependency
./mvnw dependency:list
# patch
A set ENV LOG4J_FORMAT_MSG_NO_LOOKUPS=true
B add vm option -Dlog4j2.formatMsgNoLookups=true
C.1 add properties log4j2.formatMsgNoLookups=true (NOT WORK)
C.2 add properties log4j.formatMsgNoLookups=true (NOT WORK)
D update <log4j2.version>2.15.0</log4j2.version>
E in log4j2.xml replace %m with %m{nolookups}
文件快照
[4.0K] /data/pocs/0f68fd201c62eea89a1e82c19f519c612c50c987
├── [4.0K] http-request
│ ├── [ 100] actuator-health.http
│ ├── [ 445] attack.http
│ ├── [ 130] greet.http
│ └── [ 77] hello.http
├── [9.8K] mvnw
├── [6.5K] mvnw.cmd
├── [2.6K] pom.xml
├── [ 449] README.md
└── [4.0K] src
├── [4.0K] main
│ ├── [4.0K] java
│ │ └── [4.0K] com
│ │ └── [4.0K] example
│ │ └── [4.0K] cve202144228demo
│ │ ├── [4.0K] controller
│ │ │ └── [1.1K] HelloController.java
│ │ └── [ 353] Cve202144228DemoApplication.java
│ └── [4.0K] resources
│ ├── [ 32] application.properties
│ └── [ 962] log4j2.xml
└── [4.0K] test
└── [4.0K] java
└── [4.0K] com
└── [4.0K] example
└── [4.0K] cve202144228demo
└── [ 239] Cve202144228DemoApplicationTests.java
14 directories, 13 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。