Can we find Log4Shell with Java Fuzzing? 🔥 (CVE-2021-44228 - Log4j RCE)

preview_player
Показать описание

In this video, I'm trying to find the famous java Log4Shell RCE (CVE-2021-44228) using fuzzing. I'm targeting apache log4j2 version 2.14.1 and I'm using Jazzer, the Java fuzzer developed by Code Intelligence. I will show and give you everything to reproduce the same at home ;)
Don't forget to patch the apache log4j vulnerability by switching to version log4j 2.15.0 or 2.16.0.

#Fuzzing #log4j #Log4Shell

00:00 Introduction
03:58 Jazzer: the best Java fuzzer
05:22 Fuzzing harness
07:38 Run the fuzzer
10:30 Why we are not finding the Log4Shell?
16:33 Final words

Links:

==== 💻 FuzzingLabs Training ====

==== 🦄 Join the community ====

==== 📡 Socials ====

Keywords: Fuzzing, Fuzz Testing, Java, Jazzer, Log4Shell, log4j, log4j2, RCE, CVE-2021-44228
Рекомендации по теме
Комментарии
Автор

hey patrick, thanks for the video, very informative! keep on fuzzing ;-)

xca
Автор

LAST MINUTE UPDATE: Jazzer has been updated to detect such vulnerabilities

fuzzinglabs
Автор

I tip is to use -close_fd_mask=1 as argument when running this. This will close stdout and you will get a lot better execution speed.

trexake
Автор

Hey! your advice helped me! i started using phaser zest for java.
mvn test-compile >>
and
mvn jqf: fuzz -Dclass = foobazbar -Dmethod = testmethod -Dtime = 100500m
here is my question:
if with simple types such as integer or long everything is ok
you can set the range @InRange (min = "8", max = "13") int _value

how do i change the input fuzzer with string ???
otherwise he throws me mostly in Chinese))

love from russia :) and happy new year)🦢🦢🦢

dt_sevatarion