cve/2021/CVE-2021-44832.md

108 lines
5.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2021-44832](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44832)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Log4j2&color=blue)
2025-09-29 21:09:30 +02:00
![](https://img.shields.io/static/v1?label=Version&message=log4j-core%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-20%20Improper%20Input%20Validation&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-74%20Improper%20Neutralization%20of%20Special%20Elements%20in%20Output%20Used%20by%20a%20Downstream%20Component%20('Injection')&color=brightgreen)
2024-05-25 21:48:12 +02:00
### Description
Apache Log4j2 versions 2.0-beta7 through 2.17.0 (excluding security fix releases 2.3.2 and 2.12.4) are vulnerable to a remote code execution (RCE) attack when a configuration uses a JDBC Appender with a JNDI LDAP data source URI when an attacker has control of the target LDAP server. This issue is fixed by limiting JNDI data source names to the java protocol in Log4j2 versions 2.17.1, 2.12.4, and 2.3.2.
### POC
#### Reference
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apache-log4j-qRuKNEbd
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
#### Github
- https://github.com/ADP-Dynatrace/dt-appsec-powerup
2025-09-29 21:09:30 +02:00
- https://github.com/ARPSyndicate/cve-scores
2024-05-25 21:48:12 +02:00
- https://github.com/ARPSyndicate/cvemon
2025-09-29 21:09:30 +02:00
- https://github.com/Boupouchi/Log4j-Detector-PFA
- https://github.com/Chrisync/CVE-Scanner
2024-05-25 21:48:12 +02:00
- https://github.com/CycodeLabs/cycode-aws-live-stream
2025-09-29 21:09:30 +02:00
- https://github.com/DK26/local-secrets
2024-05-25 21:48:12 +02:00
- https://github.com/GluuFederation/Log4J
- https://github.com/HynekPetrak/log4shell-finder
2025-09-29 21:09:30 +02:00
- https://github.com/MaineK00n/vuls2
2024-05-25 21:48:12 +02:00
- https://github.com/Mattrobby/Log4J-Demo
- https://github.com/NaInSec/CVE-PoC-in-GitHub
- https://github.com/NiftyBank/java-app
- https://github.com/Pluralsight-SORCERI/log4j-resources
- https://github.com/Qualys/log4jscanwin
- https://github.com/Ryan2065/Log4ShellDetection
- https://github.com/SYRTI/POC_to_review
2025-09-29 21:09:30 +02:00
- https://github.com/ShadowPayload06/Internship-security-scan-
2024-05-25 21:48:12 +02:00
- https://github.com/WhooAmii/POC_to_review
- https://github.com/YoungBear/log4j2demo
- https://github.com/YunDingLab/fix_log4j2
- https://github.com/andalik/log4j-filescan
- https://github.com/aws/aws-msk-iam-auth
2025-09-29 21:09:30 +02:00
- https://github.com/bananaacaat/Log4j-Detector
2024-05-25 21:48:12 +02:00
- https://github.com/cckuailong/log4j_RCE_CVE-2021-44832
- https://github.com/chenghungpan/test_data
- https://github.com/christian-taillon/log4shell-hunting
- https://github.com/clouditor/clouditor
- https://github.com/dbzoo/log4j_scanner
- https://github.com/demonrvm/Log4ShellRemediation
- https://github.com/dinlaks/RunTime-Vulnerability-Prevention---RHACS-Demo
- https://github.com/domwood/kiwi-kafka
- https://github.com/dtact/divd-2021-00038--log4j-scanner
- https://github.com/gumimin/dependency-check-sample
2025-09-29 21:09:30 +02:00
- https://github.com/hbeooooooom/Log4shell_poc
2024-05-25 21:48:12 +02:00
- https://github.com/hillu/local-log4j-vuln-scanner
- https://github.com/hinat0y/Dataset1
- https://github.com/hinat0y/Dataset10
- https://github.com/hinat0y/Dataset11
- https://github.com/hinat0y/Dataset12
- https://github.com/hinat0y/Dataset2
- https://github.com/hinat0y/Dataset3
- https://github.com/hinat0y/Dataset4
- https://github.com/hinat0y/Dataset5
- https://github.com/hinat0y/Dataset6
- https://github.com/hinat0y/Dataset7
- https://github.com/hinat0y/Dataset8
- https://github.com/hinat0y/Dataset9
- https://github.com/jonelo/jacksum
- https://github.com/lgtux/find_log4j
- https://github.com/lhotari/pulsar-docker-images-patch-CVE-2021-44228
- https://github.com/logpresso/CVE-2021-44228-Scanner
- https://github.com/marklogic/marklogic-contentpump
- https://github.com/martinlau/dependency-check-issue
- https://github.com/mergebase/csv-compare
- https://github.com/mergebase/log4j-detector
- https://github.com/mosaic-hgw/jMeter
- https://github.com/n1f2c3/log4jScan_demo
- https://github.com/name/log4j
2025-09-29 21:09:30 +02:00
- https://github.com/name/log4j-scanner
2024-05-25 21:48:12 +02:00
- https://github.com/nlmaca/Wowza_Installers
- https://github.com/nomi-sec/PoC-in-GitHub
- https://github.com/palantir/log4j-sniffer
- https://github.com/papicella/cli-snyk-getting-started
- https://github.com/papicella/conftest-snyk-demos
- https://github.com/paras98/Log4Shell
- https://github.com/pentesterland/Log4Shell
- https://github.com/phax/ph-oton
- https://github.com/salesforce-marketingcloud/FuelSDK-Java
- https://github.com/seculayer/Log4j-Vulnerability
- https://github.com/soosmile/POC
- https://github.com/srhercules/log4j_mass_scanner
- https://github.com/tachtler/browscap4jFileReader
- https://github.com/tcoliver/IBM-SPSS-log4j-fixes
- https://github.com/tdekeyser/log4shell-lab
- https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832
- https://github.com/thl-cmk/CVE-log4j-check_mk-plugin
- https://github.com/tmax-cloud/install-EFK
- https://github.com/trhacknon/CVE-2021-44228-Scanner
- https://github.com/trhacknon/Pocingit
- https://github.com/trhacknon/log4shell-finder
- https://github.com/wayward710/Lablab_Vertex
- https://github.com/whitesource/log4j-detect-distribution
- https://github.com/wortell/log4j
- https://github.com/yannart/log4shell-scanner-rs
- https://github.com/yhorndt/mule-3.x-log4j-update-script
- https://github.com/zecool/cve