Share
## https://sploitus.com/exploit?id=8F362564-1631-5AF9-BB38-D1BFC4678DAE
# ftp_over_log4j
File transfers using the log4shell vulnerability (CVE-2021-44228)

### Usage

`ftpl4j.sh [get|set] file`

### Description

To send a file, the script will start a dummy LDAP server. The file to send will be registered as an LDAP object on the server. A log4shell-triggering `jndi` is then sent over port 80, triggering the exploit and uploading the file to the remote.

To receive a file, well, wait for me to work it out.

### Contributors

MURGIA Sasha Emily Chelsea <chelsea486mhz@protonmail.com>