## https://sploitus.com/exploit?id=838999A6-1C7A-5ED2-BB58-2AF8B4A3981A
<div align="center">
<img src="https://raw.githubusercontent.com/pascal-lab/Tai-e/master/tai-e-logo.png" height="200">
# Tai-e for CVE-2021-44228
</div>
This a sample project that utilizes [Tai-e](https://github.com/pascal-lab/tai-e) to identify Log4Shell (a.k.a. CVE-2021-44228) vulnerability and its trigger paths
Related video (in Chinese): https://www.bilibili.com/video/BV1dV411F781
## Getting started
Clone this repository via Git:
```
git clone https://github.com/Tai-e/CVE-2021-44228.git
```
Run the following command in your terminal:
```
./gradlew run
```
Check the `taint-flow-graph.dot` and `tai-e.log` in the output directory `./output` for the results.
Optional: you could use the following command to transform the dot file to svg file in the `./output` directory
```
dot -Tsvg -o taint-flow-graph.svg taint-flow-graph.dot
```
---
This repo based on the [Tai-e Template][template].
[template]: https://github.com/Tai-e/Tai-e-Template