POC详情: 5713ee9c6be21d157d4eb4c0b422d128677b3874

来源
关联漏洞
标题: Apache Log4j 代码问题漏洞 (CVE-2021-44228)
描述:Apache Log4j是美国阿帕奇(Apache)基金会的一款基于Java的开源日志记录工具。 Apache Log4J 存在代码问题漏洞,攻击者可设计一个数据请求发送给使用 Apache Log4j工具的服务器,当该请求被打印成日志时就会触发远程代码执行。
描述
Aims to find JndiLookup.class in nearly any directory or zip, jar, ear, war file, even deeply nested.
介绍
# File system scanner for CVE-2021-44228

Aims to find JndiLookup.class in nearly any directory or zip, jar, ear, war file, even deeply nested.

* [find-class-files](./find-class-files) – Clojure implementation should be able to run nearly anywhere Java can run, assuming there's enough disk space.
   * Given a set of file system roots (c:\my_dir or /home/home/on/the/range), shows instances of JndiLookup.class on the disk or in zips.
* [windows_cmd](./windows_cmd) – Prototype Windows scripts are batch files, but they're really slow and can get pretty verbose and they can't tell you the file hash.
文件快照

[4.0K] /data/pocs/5713ee9c6be21d157d4eb4c0b422d128677b3874 ├── [4.0K] examples │   ├── [ 0] empty.jar │   ├── [ 742] jar.jar │   ├── [ 24] JndiLookup.class │   ├── [4.0K] nothing_hiding_in_here │   │   └── [ 0] just_a_file_to_make_sure_extra_files_are_handled_ok.txt │   ├── [4.0K] somewhere │   │   └── [4.0K] or │   │   └── [4.0K] another │   │   └── [ 154] JndiLookup.zip │   └── [ 868] uberjar.war ├── [4.0K] find-class-files │   ├── [ 2] deps.edn │   └── [4.0K] src │   └── [4.0K] find_class_files │   └── [7.7K] program.clj ├── [4.0K] findclassfiles │   ├── [ 326] build_and_package.cmd │   ├── [ 643] findJndiLookup.cmd │   ├── [ 255] findJndiLookup.ps1 │   ├── [ 645] project.clj │   ├── [ 757] README.md │   └── [4.0K] src │   └── [4.0K] findclassfiles │   └── [9.4K] program.clj ├── [ 607] README.md └── [4.0K] windows_cmd ├── [ 380] check_drive.cmd ├── [1.0K] investigate_archive.cmd ├── [ 176] investigate_archives.cmd ├── [ 934] investigate_sub_archive.cmd ├── [273K] investigate.txt ├── [ 320] list.cmd └── [ 193] runall.cmd 12 directories, 22 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。