This a sample project that utilizes Tai-e to identify Log4Shell (a.k.a. CVE-2021-44228) vulnerability and its trigger paths
Related video (in Chinese): https://www.bilibili.com/video/BV1dV411F781
Clone this repository via Git:
git clone https://github.com/Tai-e/CVE-2021-44228.git
Run the following command in your terminal:
./gradlew run
Check the taint-flow-graph.dot
and tai-e.log
in the output directory ./output
for the results.
Optional: you could use the following command to transform the dot file to svg file in the ./output
directory
dot -Tsvg -o taint-flow-graph.svg taint-flow-graph.dot
This repo based on the Tai-e Template.