Skip to content

漏洞利用 Apache Solr 8.2.0 Velocity RCE 0day Exploit

k8gege edited this page Nov 2, 2019 · 9 revisions

Apache Solr <=8.2.0 Velocity Template 0day Exploit

Exp: https://github.com/k8gege/SolrExp

配置

0x001 批量URL配置Cscan.ini
[Cscan]
exe=F:\Python279\python.exe
arg=exp.py $ip$ whoami
0x002 批量C段配置Cscan.ini
[Cscan]
exe=F:\Python279\python.exe
arg=exp.py http://$ip$:8983 whoami

利用

单个: python exp.py url cmd
或 Cscan url
批量C段: Cscan 192.168.1.8/24
批量URL: Cscan (同目录放url.txt)

Clone this wiki locally