Skip to content

Commit

Permalink
Update Log4Shell references and VCenter URI
Browse files Browse the repository at this point in the history
  • Loading branch information
zeroSteiner committed Dec 17, 2021
1 parent 6175e38 commit 60de839
Show file tree
Hide file tree
Showing 3 changed files with 6 additions and 4 deletions.
2 changes: 1 addition & 1 deletion data/exploits/CVE-2021-44228/http_uris.txt
Original file line number Diff line number Diff line change
Expand Up @@ -3,4 +3,4 @@
# Apache Solr
/solr/admin/cores?action=CREATE&wt=json&name=${jndi:uri}
# VMWare VCenter
/websso/SAML2/SSO/photon-machine.lan?SAMLRequest=
/websso/SAML2/SSO/vsphere.local?SAMLRequest=
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ This module has been successfully tested with:
5. Do: `run`
6. The target should be identified as vulnerable

### Struts2 Setup
### Apache Struts2 Setup

The following docker file can be used to setup a vulnerable Struts2 instance for testing.

Expand Down Expand Up @@ -68,7 +68,7 @@ Time in seconds to wait to receive LDAP connections.

## Scenarios

### Struts2
### Apache Struts2

```
msf6 > use auxiliary/scanner/http/log4shell_scanner
Expand Down
4 changes: 3 additions & 1 deletion modules/auxiliary/scanner/http/log4shell_scanner.rb
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,9 @@ def initialize
],
'References' => [
[ 'CVE', '2021-44228' ],
[ 'URL', 'https://attackerkb.com/topics/in9sPR2Bzt/cve-2021-44228-log4shell/rapid7-analysis' ]
[ 'CVE', '2021-45046' ],
[ 'URL', 'https://attackerkb.com/topics/in9sPR2Bzt/cve-2021-44228-log4shell/rapid7-analysis' ],
[ 'URL', 'https://logging.apache.org/log4j/2.x/security.html' ]
],
'DisclosureDate' => '2021-12-09',
'License' => MSF_LICENSE,
Expand Down

0 comments on commit 60de839

Please sign in to comment.