.. / CVE-2021-44228

Exploit for Apache Log4j2 Remote Code Injection (CVE-2021-44228)

Description:

Apache Log4j2 <=2.14.1 JNDI features used in configuration, log messages, and parameters do not protect against attacker controlled LDAP and other JNDI related endpoints. An attacker who can control log messages or log message parameters can execute arbitrary code loaded from LDAP servers when message lookup substitution is enabled.

Proof of Concept

PoC exploit

Nuclei Template

View the template here CVE-2021-44228.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-44228.yaml
Copy

Try the exploit in a lab environment:

Lab Machine Link
Hack The Box Crafty Go to Practice

References:

https://nvd.nist.gov/vuln/detail/CVE-2021-44228
https://www.lunasec.io/docs/blog/log4j-zero-day/
https://logging.apache.org/log4j/2.x/security.html
https://github.com/advisories/GHSA-jfh8-c2jp-5v3q
https://gist.github.com/bugbountynights/dde69038573db1c12705edb39f9a704a