支持本站 — 捐款将帮助我们持续运营

目标: 1000 元,已筹: 1000

100.0%

POC详情: 46fc4777100aae990d288a8fa92534251f71d9ee

来源
关联漏洞
标题:Apache Solr 信息泄露漏洞 (CVE-2023-50290)
Description:Apache Solr是美国阿帕奇(Apache)基金会的一款基于Lucene(一款全文搜索引擎)的搜索服务器。该产品支持层面搜索、垂直搜索、高亮显示搜索结果等。 Apache Solr 9.0.0至9.3.0之前版本存在信息泄露漏洞,该漏洞源于存在敏感信息泄露漏洞。
Description
Bug bounty and vulnerability research reports by Desai Vinayak — includes CVE-2023-50290 (Apache Solr) and Zscaler subdomain takeover findings.
介绍
# 🧩 Bug Bounty Reports — Desai Vinayak

**🔒 Bug bounty and vulnerability research reports by _Desai Vinayak_.**  
This repository collects **passive, non-destructive** vulnerability write-ups and supporting evidence for **coordinated disclosure** and **remediation tracking**.

---

## 📁 Contents

📂 **reports/** — PDF, DOCX, and evidence files for each report:
- 🧠 `Bug_Bounty_Report_Desai_Vinayak_CVE-2023-50290.pdf` — Apache Solr Metrics API information disclosure (**CVE-2023-50290**).  
- 🌐 `zscaler_bugbounty_report.pdf` — Potential subdomain takeover findings for selected `zscaler.com` subdomains.  
- 📜 `CVE-2023-50290_summary.md` — Markdown summary of the Solr report.  
- 📜 `zscaler_subdomain_takeover_summary.md` — Markdown summary of the Zscaler findings.  

🧾 **Other files**
- 🤝 `CONTRIBUTING.md` — Guidance for triage teams and vendors.  
- 🕵️ `DISCLOSURE_POLICY.md` — Coordinated disclosure expectations.  
- 🧩 `ISSUE_TEMPLATE.md` — Template to open remediation/tracking issues.  
- ⚙️ `.github/workflows/` — CI placeholders.  
- 🚀 `PUBLISH.md` — Quick publish instructions.  

---

## 🧠 Summary

This repository currently contains two primary reports produced via **passive reconnaissance**:

### 🔹 Apache Solr — CVE-2023-50290
The Solr Metrics API can expose environment and configuration details that may leak sensitive information.  
📄 See the Solr PDF and summary in `/reports`.

### 🔹 Zscaler — Potential Subdomain Takeover
Several `zscaler.com` subdomains resolve to third-party hosts returning provider unconfigured/error pages (e.g., AWS ELB, Acquia, UptimeRobot).  
These may be vulnerable to takeover if unprovisioned.  
📄 See the Zscaler PDF and summary in `/reports`.

🧷 **All scans and evidence collection were passive and non-destructive:**  
DNS lookups, certificate-transparency checks, HTTP headers, and non-invasive content captures.  
No credentials, no POST requests, no exploitation performed.

---

## ⚙️ How to Use

👩‍💻 **Vendors / Triage Teams**
- Open an issue using `ISSUE_TEMPLATE.md`.  
- Reference the report filename in `/reports/`.  
- Include remediation steps, progress updates, and final status.

🧑‍🔬 **External Researchers**
- Please follow the coordinated disclosure policy (`DISCLOSURE_POLICY.md`)  
  before publishing or sharing findings.

---

## 🧰 Remediation Recommendations (High-Level)

✅ Remove or fix unused CNAME records that point to third-party services.  
✅ Properly configure custom domains on provider dashboards for services in use.  
✅ Restrict access to sensitive admin endpoints (e.g., Solr `/admin/metrics`) and require authentication.  
✅ Rotate any secrets that may have been exposed via configuration or environment variables.  
✅ Implement DNS monitoring and alerting for unexpected external CNAMEs or CT-log changes.

📎 _Detailed remediation steps are included in each report._

---

## 🤝 Coordinated Disclosure & Contact

**Reporter:** Desai Vinayak  
📧 **Email:** [desaivinayak449@gmail.com](mailto:desaivinayak449@gmail.com)

Please acknowledge receipt and provide a remediation timeline when opening issues or contacting the reporter.  
Coordinated disclosure is requested — **public disclosure should be delayed until remediation is complete** (see `DISCLOSURE_POLICY.md`).

---

## 📄 License

🪪 This repository is distributed under the **MIT License**.  
See `LICENSE` for full terms.
文件快照

[4.0K] /data/pocs/46fc4777100aae990d288a8fa92534251f71d9ee ├── [2.6K] live_url.txt ├── [1.4K] nuclei_exposed_more.txt ├── [3.4K] README.md ├── [2.1K] targets.txt ├── [ 57K] urls.txt ├── [1022K] zscaler_bugbounty_report.pdf └── [5.9K] zscaler_report.txt 1 directory, 7 files
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮件到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对 POC 代码进行快照,为了长期维护,请考虑为本地 POC 付费/捐赠,感谢您的支持。