POC详情: dfffa29e4173bdefe7445ee901523824d156fd74

来源
关联漏洞
标题: Apache Log4j 代码问题漏洞 (CVE-2021-44228)
描述:Apache Log4j是美国阿帕奇(Apache)基金会的一款基于Java的开源日志记录工具。 Apache Log4J 存在代码问题漏洞,攻击者可设计一个数据请求发送给使用 Apache Log4j工具的服务器,当该请求被打印成日志时就会触发远程代码执行。
描述
Testing WAF protection against CVE-2021-44228 Log4Shell
介绍
Simple bash script to test your WAF or other devices against Log4Shell attack strings and various bypasses

Bypass tricks from: https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words

To run:
```
./cve-2021-44228.sh -t <URL of the target> -c <HTTP Status Code expected>
```

Or to use the defaults of https://127.0.0.1 and 403:
```
./cve-2021-44228.sh
```

For each test string, this will pass the string into a request to the target using various vectors such as:

* Headers: Using the `User-Agent` header
* URI: Appending the string to requested URI
* Cookies: As the data value of a Cookie
* Query String: As the value of a query string parameter
* POST Body Data: As the body data of a POST request


Example output:
```
Test String: ${jndi:}
-------------------------------------------------------------
HEADERS: curl -ksg -w "%{http_code}" https://127.0.0.1 -A '${jndi:}'
    403
URI: curl -ksg -w "%{http_code}" 'https://127.0.0.1/${jndi:}'
    403
Cookies: curl -ksg -w "%{http_code}" https://127.0.0.1 -b 'session=${jndi:}'
    403
Query String: curl -ksg -w "%{http_code}" 'https://127.0.0.1/something?session=${jndi:}'
    403
POST Data: curl -X POST -ksg -w "%{http_code}" https://127.0.0.1 -d '${jndi:}'
    403
```
文件快照

[4.0K] /data/pocs/dfffa29e4173bdefe7445ee901523824d156fd74 ├── [5.1K] cve-2021-44228.sh └── [1.2K] README.md 0 directories, 2 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。