Share
## https://sploitus.com/exploit?id=838999A6-1C7A-5ED2-BB58-2AF8B4A3981A
<div align="center">
  <img src="https://raw.githubusercontent.com/pascal-lab/Tai-e/master/tai-e-logo.png" height="200">

# Tai-e for CVE-2021-44228

</div>

This a sample project that utilizes [Tai-e](https://github.com/pascal-lab/tai-e) to identify Log4Shell (a.k.a. CVE-2021-44228) vulnerability and its trigger paths

Related video (in Chinese): https://www.bilibili.com/video/BV1dV411F781

## Getting started

Clone this repository via Git:

```
git clone https://github.com/Tai-e/CVE-2021-44228.git
```

Run the following command in your terminal:

```
./gradlew run
```

Check the `taint-flow-graph.dot` and `tai-e.log` in the output directory `./output` for the results.

Optional: you could use the following command to transform the dot file to svg file in the `./output` directory

```
dot -Tsvg -o taint-flow-graph.svg taint-flow-graph.dot
```


---

This repo based on the [Tai-e Template][template].

[template]: https://github.com/Tai-e/Tai-e-Template