Skip to content

漏洞利用 Apache Solr 8.2.0 Velocity RCE 0day Exploit

k8gege edited this page Nov 2, 2019 · 9 revisions

Apache Solr <=8.2.0 Velocity Template 0day Exploit

Exploit: https://github.com/k8gege/SolrExp
Cscan: https://github.com/k8gege/K8CScan

环境

下载Solr 8.2.0添加core,默认配置即可。7.x版本自带core

配置

0x001 批量URL配置Cscan.ini
[Cscan]
exe=F:\Python279\python.exe
arg=exp.py $ip$ whoami
0x002 批量C段配置Cscan.ini
[Cscan]
exe=F:\Python279\python.exe
arg=exp.py http://$ip$:8983 whoami

利用

单个: python exp.py url cmd
或 Cscan url
批量C段: Cscan 192.168.1.8/24
批量URL: Cscan (同目录放url.txt)

Clone this wiki locally