Bonus! Red Log4Jack
The screen to start is very complex, but I'm going to copy paste specific things so they're readable. It generally looked like this:
Confirmed the endpoint http://solrpower.kringlecastle.com:8983/solr/
is running Solr
Running the marshalsec marshalling service to exploit:
Code I'm going to compile which will be marshalled, waiting for java to pick it up an deserialize it, causing a shell to bounce back.
The result:
Triggering the exploit:
JNDI reaches out to my ldap server responder:
LDAP server responds with a redirection to my waiting web server to deliver the YuleLogExploit.class
file:
Netcat shell!
Found in /home/solr
, the file kringle.txt
And submitting the answer: