POC详情: 99f241dc277b23d5a8b89f4a1534a7c0a0f468e2

来源
关联漏洞
标题: Apache Log4j 代码问题漏洞 (CVE-2021-44228)
描述:Apache Log4j是美国阿帕奇(Apache)基金会的一款基于Java的开源日志记录工具。 Apache Log4J 存在代码问题漏洞,攻击者可设计一个数据请求发送给使用 Apache Log4j工具的服务器,当该请求被打印成日志时就会触发远程代码执行。
描述
A one-stop repo/  information hub for all log4j vulnerability-related information.
介绍
# How-to-check-log4j-CVE-2021-44228
![](./assets/log4jBanner.gif)



### What is log4j ?
LOG4J is a open-source Java-based Apache Software used for logging services.

### What is log4j Vulnerability CVE-2021-44228 ?
The Log4j vulnerability allows remote code execution by simply typing a specific string into a textbox , works on every program using the Log4j library.



### Attack Surfaces / Related Softwares
| List of affected   | Related Links  |
| ------------ | ------------ |
|Brands |[YfryTchsGD github](https://github.com/YfryTchsGD/Log4jAttackSurface) link gives us a list of impacted services or components or manufacturers ( Apple, Tencent, Twitter, Cloudflare, Amazon, Tesla ...etc)|
| Softwares| Publised by Nationaal Cyber Security Centrum , [github link](https://github.com/NCSC-NL/log4shell/blob/main/software/README.md). (Adobe,EC2, AWS API gateway,DocumentDB, DynamoDB, Kafka, Kinesis, S3, SNS, SQS, AWS SSO, Apache Cisco, CYber ARk, Dell, FOrtinet,Fujitsu, IBM, JuniperNetworks, .......etc)





## How to check your server is vulnerabe or not?

There are heaps of metrails avilable on internet by now am adding few here.
make sure you read the resources before you use it.

I have writted a simple code to scan for log4j Vulnerability
## Quick Scan 
```wget https://raw.githubusercontent.com/anuvindhs/how-to-check-patch-secure-logj4-CVE-2021-44228/main/assets/scan.sh -q -O -| bash ```






| Source    | Related Links  |
| :------------: | ------------ |
|<img width="550" alt="portfolio_view" src=./assets/aws.jpg>|[Hotpatch](https://aws.amazon.com/blogs/opensource/hotpatch-for-apache-log4j/) for Apache Log4j</br> [AWS security services](https://aws.amazon.com/blogs/security/using-aws-security-services-to-protect-against-detect-and-respond-to-the-log4j-vulnerability/) to protect against, detect, and respond to the Log4j vulnerability</br> [Mitigating the Apache log4j security issue ](https://aws.amazon.com/blogs/containers/advice-on-mitigating-the-apache-log4j-security-issue-for-eks-ecs-and-fargate-customers/) for EKS, ECS, and Fargate customers|
|<img width="90" alt="portfolio_view" src=https://www.cisa.gov/uscert/sites/default/files/cert/logo3.png>|Cybersecurity and Infrastructure Security Agency’s Emergency Directive 22-02 [Mitigate Apache Log4j Vulnerability](https://www.cisa.gov/emergency-directive-22-02) </br>Apache Log4j [ Vulnerability Guidance from CISA ](https://www.cisa.gov/uscert/apache-log4j-vulnerability-guidance)|
|<img width="550" alt="portfolio_view" src=./assets/Microsoft.png>|[ Guidance for preventing, detecting, and hunting for exploitation of the Log4j 2 vulnerability](https://www.microsoft.com/security/blog/2021/12/11/guidance-for-preventing-detecting-and-hunting-for-cve-2021-44228-log4j-2-exploitation)| 
|<img width="250" alt="portfolio_view" src=./assets/githublogo.png>|i have written a simple bash script to do a basic quick scan.<br /> [Inspect Code](https://raw.githubusercontent.com/anuvindhs/how-to-check-patch-secure-logj4-CVE-2021-44228/main/assets/scan.sh)<br /> [Copy code](#quick-scan)
|<img width="200" alt="portfolio_view" src=https://www.clusterednetworks.com/themes/cn-clusterednetworks2/assets/images/clusterednetworks.logo.small.transparent.png>|Check your Server for the Java Log4j Vulnerability , <br />[Blog link](https://www.clusterednetworks.com/blog/post/how-check-your-server-java-log4j-vulnerability "Clustered network") , [Youtube Tutorial](https://youtu.be/9sXASvVu9L8) , [github link](https://github.com/rubo77/log4j_checker_beta)|
| <img width="350" alt="portfolio_view" src=https://www.trendmicro.com/content/dam/trendmicro/global/en/global/logo/tm-research-logo.png> | <br />[Website Link](https://log4j-tester.trendmicro.com/), It comes with a web based tool to identify the affected servers CVE-2021-44228|
|<img width="250" alt="portfolio_view" src=https://northwave-security.com/wp-content/uploads/2016/01/NW-Logo-400.jpg> | Performs two specific checks: HTTP headers and HTTP GET request, [github link](https://github.com/rubo77/log4j_checker_beta)  |
| <img width="250" alt="portfolio_view" src=https://chapter8.com/assets/images/chapter8-logo-blue.svg> |log4j PowerShell Checker [github Link](https://github.com/crypt0jan/log4j-powershell-checker)|
|<img width="250" alt="portfolio_view" src=https://dkh9ehwkisc4.cloudfront.net/static/images/fullhunt.png>|A fully automated, accurate, and extensive scanner for finding vulnerable log4j hosts, [github link](https://github.com/fullhunt/log4j-scan)|
|[ADIL SOYBALI](https://adilsoybali.com/#home)|Log4j-RCE-Scanner,scan for remote command execution vulnerability CVE-2021-44228 on Apache Log4j at multiple addresses.[github link](https://github.com/adilsoybali/Log4j-RCE-Scanner)|
|<img width="250" alt="portfolio_view" src=./assets/codeshieldlogo.png>|Bytecode Detector,scans all running java processes for vulnerable log4j files. It is NOT invasive and DOES NOT require you to stop your application. It also check, if the program includes artifacts that re-bundled or re-compiled the vulnerable log4j JARs [github link](https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector)|
|<img width="550" alt="portfolio_view" src=./assets/CS.png>|Log4j Quick [Reference Guide (QRG)](https://www.crowdstrike.com/blog/crowdstrike-services-launches-log4j-quick-reference-guide)</br> Live Log4J [Worldwide threat tracker](https://crowdsec.net/log4j-tracker/)</br>  Free Targeted Log4j [Search Tool](https://www.crowdstrike.com/blog/free-targeted-log4j-search-tool/)|




## Lab Environments
| Created by   |Lab Environment  |
| :------------: | ------------ |
|<img width="150" alt="portfolio_view" src=https://assets.tryhackme.com/img/THMlogo.png> & [JohnHammond](https://tryhackme.com/p/JohnHammond)|[Solar, exploiting log4j](https://tryhackme.com/room/solar) </br> <img width="250" alt="portfolio_view" src=./assets/tryhackme.png>|
|<img width="250" alt="portfolio_view" src=https://assets.pentesterlab.com/logo_m.png>|[Log4j RCE](https://pentesterlab.com/exercises/log4j_rce/course),This challenge covers the latest RCE in Log4j|
|<img width="200" alt="portfolio_view" src=./assets/ine.png>|Review the Log4J (also known as the Log4Shell) vulnerability, its use in networks currently, and demo the [exploit in a sandboxed environment](https://ine.com/learning/courses/log4j-vulnerability-log4shell)


  ** Will update more information on coming days ...





文件快照

[4.0K] /data/pocs/99f241dc277b23d5a8b89f4a1534a7c0a0f468e2 ├── [4.0K] assets │   ├── [ 15K] aws.jpg │   ├── [5.0K] codeshieldlogo.png │   ├── [2.4K] CS.png │   ├── [ 31K] githublogo.png │   ├── [ 27K] ine.png │   ├── [ 96K] log4jBanner.gif │   ├── [4.0K] Microsoft.png │   ├── [8.5K] nist.jpg │   ├── [ 713] scan.sh │   └── [ 35K] tryhackme.png ├── [ 25] _config.yml └── [6.3K] README.md 1 directory, 12 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。