关联漏洞
介绍
# CVE-2021-44228-VULN-APP
- NOTE: This is a vulnerable virtual machine for showing what actually is this vulnerability log4j, and so on!
## Installation:
```docker
cd CVE-2021-44228-VULN-APP/
docker build -t log4j-shell-poc .
docker run --network host log4j-shell-poc
```
- Listening on port `8080`
文件快照
[4.0K] /data/pocs/bf8a8e03bb4a320106ab0b5e96be2c9e60f6596b
├── [ 177] Dockerfile
├── [ 301] README.md
├── [4.0K] target
│ ├── [1.8M] log4shell-1.0-SNAPSHOT.war
│ └── [ 41M] marshalsec-0.0.3-SNAPSHOT-all.jar
└── [4.0K] vulnerable-application
├── [2.5K] log4shell.iml
├── [2.2K] pom.xml
└── [4.0K] src
└── [4.0K] main
├── [4.0K] java
│ └── [4.0K] com
│ └── [4.0K] example
│ └── [4.0K] log4shell
│ ├── [ 226] log4j.java
│ └── [1.2K] LoginServlet.java
└── [4.0K] webapp
├── [2.4K] index.jsp
└── [4.0K] WEB-INF
└── [ 304] web.xml
10 directories, 10 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。