漏洞描述 'Log4j是Apache的一个开源项目,该漏洞产生的原因在于Log4j在记录日志的过程中会对日志内容进行判断,如果内容中包含了${,则Log4j会认为此字符属于JNDI远程加载类的地址。攻击者通过构造恶意的代码即可利用该漏洞,从而导致服务器权限丢失。'
相关漏洞推荐 POC CVE-2021-45046-DAST: Apache Log4j2 - Remote Code Injection POC CVE-2021-44228: Apache Log4j2 Remote Code Injection POC CVE-2021-45046: Apache Log4j2 - Remote Code Injection POC CVE-2017-5645: Apache Log4j Server - Deserialization Command Execution POC CVE-2021-44228: Apache Log4j2 Remote Code Injection POC apache-ofbiz-log4j-rce-temp: Apache OFBiz Log4j JNDI RCE POC apache-ofbiz-log4j-rce: Apache OFBiz Log4j JNDI RCE POC cisco-cloudcenter-suite-log4j-rce: Cisco CloudCenter Suite (Log4j) - Remote Code Execution POC ivanti-mobileiron-log4j-jndi-rce: Ivanti MobileIron Log4J JNDI RCE POC solr-log4j-rce: Apache Solr Log4j Remote Code Execution POC unifi-network-log4j-rce: UniFi Network Log4j JNDI RCE POC vmware-vcenter-log4j-jndi-rce-temp: VMware VCenter - Remote Code Execution (Apache Log4j) POC vmware-vcenter-log4j-jndi-rce: VMware VCenter - Remote Code Execution (Apache Log4j)