POC详情: 3c1b11fbf1ffb4c4520e22faf275fd0db9beeda0

来源
关联漏洞
标题: Apache Log4j 代码问题漏洞 (CVE-2021-44228)
描述:Apache Log4j是美国阿帕奇(Apache)基金会的一款基于Java的开源日志记录工具。 Apache Log4J 存在代码问题漏洞,攻击者可设计一个数据请求发送给使用 Apache Log4j工具的服务器,当该请求被打印成日志时就会触发远程代码执行。
描述
Script - Workaround instructions to address CVE-2021-44228 in vCenter Server 
介绍
# vCenter Server Workaround instructions CVE-2021-44228
 Workaround instructions to address CVE-2021-44228 in vCenter Server 

VMware vCenter log4j workaround
This is the workaround VMware vCenter log4j vulnerability CVE-2021-44228 processs put together as a single script

VMware have released a python script linked on the KB article (works Much better :-)

If you don't like quick and dirty..
Apply workarounds and verify

cve-workaround
Run verification only

cve-workaround -v
Rollback - very basic, copies the .bak files over the patched files, restarts the services, and prints status messages.
cve-workaround -rollback
PSC Client Service for 6.5 - thank you to Power-Wagon on reddit for verifying
cve-workaround -sprayandpray65

Simple steps:
SSH to vCenter
Type shell to enter shell mode
Paste entire contents of script
Type cve, hit tab, enter
And you're done.

The Process:
Automatically detects the version and required steps
Backs up existing files to .bak files
Applies the workarounds recommended by VMware
Skips any steps that are already applied
Reports status as it goes
Provides a summary at the end - verification is more accurate / granular than the KB steps

文件快照

[4.0K] /data/pocs/3c1b11fbf1ffb4c4520e22faf275fd0db9beeda0 ├── [1.2K] README.md └── [ 12K] run-cve-patch.sh 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。