Discovery

This target machine is running Apache Solr 8.11.0, one example of software that is known to include this vulnerable log4j package.

I explored the web interface accessible at http://10.10.75.171:8983 and clicked around to get a feel for the application. For more detail on Apache Solr, please refer to their official website. https://solr.apache.org/

http://10.10.75.171:8983

This instance of Apache Solr is provisioned with no data whatsoever. It is a flat, vanilla, and absolutely minimum installation -- yet at its core it is still vulnerable to this CVE-2021-44228.

When navigating to http://10.10.75.171:8983. I could see clear indicators that log4j is in use within the application for logging activity. The -Dsolr.log.dir argument was set to, /var/solr/logs

solr logs

The path/ URL endpoint that is indicated in these repeat entries are - /admin/cores

I also gathered from these log entries that there are some datapoints I could control as a user. Params={} field gave that away.

Last updated