Log4J CVE-2021-44228 Minecraft PoC# CVE-2021-44228 in Minecraft
- Java 16
- Paper server build #397
- Minecraft 1.17.1
# Exploitation
In Java 16 only deserialization attacks work by default using log4j. To exploit this there needs to be a vulnerable serializable class in the classpath.
In the current state of this repository the server will only send a serialized string object. If you found a vulnerable serializable class feel free to create a pull request.
[4.0K] /data/pocs/12ed73a24cf3916fa7679308f3d4de0a4df16531
├── [4.0K] build
│ ├── [4.0K] classes
│ │ └── [4.0K] java
│ │ └── [4.0K] main
│ │ ├── [2.5K] LDAPRefServer$OperationInterceptor.class
│ │ ├── [3.4K] LDAPRefServer.class
│ │ └── [ 715] Main.class
│ └── [4.0K] tmp
│ └── [4.0K] compileJava
│ └── [ 14K] previous-compilation-data.bin
├── [ 411] build.gradle
├── [4.0K] gradle
│ └── [4.0K] wrapper
│ ├── [ 58K] gradle-wrapper.jar
│ └── [ 200] gradle-wrapper.properties
├── [5.6K] gradlew
├── [2.7K] gradlew.bat
├── [ 429] README.md
├── [ 38] settings.gradle
└── [4.0K] src
└── [4.0K] main
└── [4.0K] java
├── [4.7K] LDAPRefServer.java
└── [ 268] Main.java
11 directories, 13 files