Skip to content

Utilize Tai-e to identify the Log4shell (a.k.a. CVE-2021-44228) Vulnerability

Notifications You must be signed in to change notification settings

Tai-e/CVE-2021-44228

Repository files navigation

Tai-e for CVE-2021-44228

This a sample project that utilizes Tai-e to identify Log4Shell (a.k.a. CVE-2021-44228) vulnerability and its trigger paths

Related video (in Chinese): https://www.bilibili.com/video/BV1dV411F781

Getting started

Clone this repository via Git:

git clone https://github.com/Tai-e/CVE-2021-44228.git

Run the following command in your terminal:

./gradlew run

Check the taint-flow-graph.dot and tai-e.log in the output directory ./output for the results.

Optional: you could use the following command to transform the dot file to svg file in the ./output directory

dot -Tsvg -o taint-flow-graph.svg taint-flow-graph.dot

This repo based on the Tai-e Template.

About

Utilize Tai-e to identify the Log4shell (a.k.a. CVE-2021-44228) Vulnerability

Topics

Resources

Stars

Watchers

Forks

Languages