<img src="https://raw.githubusercontent.com/pascal-lab/Tai-e/master/tai-e-logo.png" height="200">
# Tai-e for CVE-2021-44228
This a sample project that utilizes [Tai-e](https://github.com/pascal-lab/tai-e) to identify Log4Shell (a.k.a. CVE-2021-44228) vulnerability and its trigger paths
Related video (in Chinese): https://www.bilibili.com/video/BV1dV411F781
## Getting started
Clone this repository via Git:
git clone https://github.com/Tai-e/CVE-2021-44228.git
Run the following command in your terminal:
Check the `taint-flow-graph.dot` and `tai-e.log` in the output directory `./output` for the results.
Optional: you could use the following command to transform the dot file to svg file in the `./output` directory
dot -Tsvg -o taint-flow-graph.svg taint-flow-graph.dot
This repo based on the [Tai-e Template][template].