.. / CVE-2021-27905

Exploit for Apache Solr <=8.8.1 - Server-Side Request Forgery (CVE-2021-27905)

Description:

Apache Solr versions 8.8.1 and prior contain a server-side request forgery vulnerability. The ReplicationHandler (normally registered at “/replication” under a Solr core) in Apache Solr has a “masterUrl” (also “leaderUrl” alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the “shards” parameter.

Nuclei Template

View the template here CVE-2021-27905.yaml

Validate with Nuclei

echo "$URL" | nuclei -t ~/nuclei-templates/http/cves/2021/CVE-2021-27905.yaml
Copy

References:

https://www.anquanke.com/post/id/238201
https://nsfocusglobal.com/apache-solr-arbitrary-file-read-and-ssrf-vulnerability-threat-alert/
https://lists.apache.org/thread.html/r0ddc3a82bd7523b1453cb7a5e09eb5559517145425074a42eb326b10%40%3Cannounce.apache.org%3E
https://ubuntu.com/security/CVE-2021-27905
https://nvd.nist.gov/vuln/detail/CVE-2021-27905