POC详情: 35ef602ea2e1f8a8625dfc6b42ca674c4d7dd92f

来源
关联漏洞
标题: Apache Log4j 代码问题漏洞 (CVE-2021-44228)
描述:Apache Log4j是美国阿帕奇(Apache)基金会的一款基于Java的开源日志记录工具。 Apache Log4J 存在代码问题漏洞,攻击者可设计一个数据请求发送给使用 Apache Log4j工具的服务器,当该请求被打印成日志时就会触发远程代码执行。
描述
CVE-2021-44228 Response Scripts
介绍
# CVE-2021-44228
This repository contains **altered** community scripts related to CVE-2021-44228 ported to EDR environments.
The scripts were modified to be compatible with other technologies' additional requirements.

See the linked repositories for an up-to-date and original version of the modified scripts.

## Palo Alto's Cortex XDR
_All the following scripts have been rendered compatible by implementing incompatible Python modules and exposing an `xdr` entry point.
Documentation regarding the `xdr` function's expected input and outputs can be found in each script._

- **[fox-it/log4j-finder](https://github.com/fox-it/log4j-finder) by NCC Group / Fox-IT / Research and Intelligence Fusion Team (RIFT)**
  
  Scan the filesystem to find Log4j2 files that is vulnerable to Log4Shell (CVE-2021-44228).
  It scans recursively both on disk and inside Java Archive files (JARs).

- **[Neo23x0/log4shell-detector](https://github.com/Neo23x0/log4shell-detector) by Florian Roth**

  Checks local log files for indicators of exploitation attempts, even heavily obfuscated ones that string or regular expression based patterns wouldn't detect.
文件快照

[4.0K] /data/pocs/35ef602ea2e1f8a8625dfc6b42ca674c4d7dd92f ├── [9.6K] log4j-finder.py ├── [ 32K] log4shell-detector.py └── [1.1K] README.md 0 directories, 3 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。