module

Apache Solr Remote Code Execution via Velocity Template

Disclosed
2019-10-29
Created
2020-04-02

Description

This module exploits a vulnerability in Apache Solr Velocity template. Currently, this module only supports Solr basic authentication.

From the Tenable advisory:
An attacker could target a vulnerable Apache Solr instance by first identifying a list
of Solr core names. Once the core names have been identified, an attacker can send a specially crafted
HTTP POST request to the Config API to toggle the params resource loader value for the Velocity Response
Writer in the solrconfig.xml file to true. Enabling this parameter would allow an attacker to use the Velocity
template parameter in a specially crafted Solr request, leading to RCE.

Authors

s00py
jas502n
AleWong
Imran E. Dawoodjee imran@threathounds.com

Platform

Linux,Unix,Windows

Module Options

To display the available options, load the module within the Metasploit console and run the commands ‘show options’ or ‘show advanced’:


msf > use exploit/multi/http/solr_velocity_rce
msf exploit(solr_velocity_rce) > show targets
...targets...
msf exploit(solr_velocity_rce) > set TARGET < target-id >
msf exploit(solr_velocity_rce) > show options
...show and set options...
msf exploit(solr_velocity_rce) > exploit

Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.