blob: d3356ba70bb3ea9ea5930c2bf60910a6965b94ec [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom"><title>Apache Solr - solr/security</title><link href="/" rel="alternate"></link><link href="/feeds/solr/security.atom.xml" rel="self"></link><id>/</id><updated>2024-04-12T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>CVE-2024-31391: Solr-Operator liveness and readiness probes may leak basic auth credentials</title><link href="/cve-2024-31391-solr-operator-liveness-and-readiness-probes-may-leak-basic-auth-credentials.html" rel="alternate"></link><published>2024-04-12T00:00:00+00:00</published><updated>2024-04-12T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2024-04-12:/cve-2024-31391-solr-operator-liveness-and-readiness-probes-may-leak-basic-auth-credentials.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Moderate&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
Solr Operator 0.3.0 to 0.8.0&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
Insertion of Sensitive Information into Log File vulnerability in the Apache Solr Operator.&lt;/p&gt;
&lt;p&gt;The Solr sked to bootstrap Solr security, the operator will enable basic authentication and create several accounts for accessing Solr: including the "solr …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Moderate&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
Solr Operator 0.3.0 to 0.8.0&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
Insertion of Sensitive Information into Log File vulnerability in the Apache Solr Operator.&lt;/p&gt;
&lt;p&gt;The Solr sked to bootstrap Solr security, the operator will enable basic authentication and create several accounts for accessing Solr: including the "solr" and "admin" accounts for use by end-users, and a "k8s-oper" account which the operator uses for its own requests to Solr.
One common source of these operator requests is healthchecks: liveness, readiness, and startup probes are all used to determine Solr's health and ability to receive traffic.
By default, the operator configures the Solr APIs used for these probes to be exempt from authentication, but users may specifically request that authentication be required on probe endpoints as well.
Whenever one of these probes would fail, if authentication was in use, the Solr Operator would create a Kubernetes "event" containing the username and password of the "k8s-oper" account.&lt;/p&gt;
&lt;p&gt;Within the affected version range, this vulnerability affects any solrcloud resource which (1) bootstrapped security through use of the &lt;code&gt;.solrOptions.security.authenticationType=basic&lt;/code&gt; option, and (2) required authentication be used on probes by setting &lt;code&gt;.solrOptions.security.probesRequireAuth=true&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;
Users are recommended to upgrade to Solr Operator version 0.8.1, which fixes this issue by ensuring that probes no longer print the credentials used for Solr requests. Users may also mitigate the vulnerability by disabling authentication on their healthcheck probes using the setting &lt;code&gt;.solrOptions.security.probesRequireAuth=false&lt;/code&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
JIRA - &lt;a href="https://issues.apache.org/jira/browse/SOLR-17216"&gt;SOLR-17216&lt;/a&gt;&lt;br&gt;
CVE - &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-31391"&gt;CVE-2024-31391&lt;/a&gt;&lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2023-50291: Apache Solr can leak certain passwords due to System Property redaction logic inconsistencies</title><link href="/cve-2023-50291-apache-solr-can-leak-certain-passwords-due-to-system-property-redaction-logic-inconsistencies.html" rel="alternate"></link><published>2024-02-08T00:00:00+00:00</published><updated>2024-02-08T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2024-02-08:/cve-2023-50291-apache-solr-can-leak-certain-passwords-due-to-system-property-redaction-logic-inconsistencies.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Moderate&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
&lt;li&gt;Apache Solr 9.0.0 before 9.3.0&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Insufficiently Protected Credentials vulnerability in Apache Solr.&lt;/p&gt;
&lt;p&gt;This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.3 …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Moderate&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
&lt;li&gt;Apache Solr 9.0.0 before 9.3.0&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Insufficiently Protected Credentials vulnerability in Apache Solr.&lt;/p&gt;
&lt;p&gt;This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.3.0.
One of the two endpoints that publishes the Solr process' Java system properties, /admin/info/properties, was only setup to hide system properties that had "password" contained in the name.
There are a number of sensitive system properties, such as "basicauth" and "aws.secretKey" do not contain "password", thus their values were published via the "/admin/info/properties" endpoint.
This endpoint populates the list of System Properties on the home screen of the Solr Admin page, making the exposed credentials visible in the UI.&lt;/p&gt;
&lt;p&gt;This /admin/info/properties endpoint is protected under the "config-read" permission.
Therefore, Solr Clouds with Authorization enabled will only be vulnerable through logged-in users that have the "config-read" permission.
Users are recommended to upgrade to version 9.3.0 or 8.11.3, which fixes the issue.
A single option now controls hiding Java system property for all endpoints, "-Dsolr.hiddenSysProps".
By default all known sensitive properties are hidden (including "-Dbasicauth"), as well as any property with a name containing "secret" or "password".&lt;/p&gt;
&lt;p&gt;Users who cannot upgrade can also use the following Java system property to fix the issue:&lt;br&gt;
&lt;code&gt;-Dsolr.redaction.system.pattern=".*(password|secret|basicauth).*"&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
Users are recommended to upgrade to version 8.11.3, 9.3.0 or later, which has consistent systemProperty redaction logic.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
Michael Taggart (reporter)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
JIRA - &lt;a href="https://issues.apache.org/jira/browse/SOLR-16809"&gt;SOLR-16809&lt;/a&gt;&lt;br&gt;
CVE - &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50291"&gt;CVE-2023-50291&lt;/a&gt;&lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2023-50292: Apache Solr Schema Designer blindly "trusts" all configsets, possibly leading to RCE by unauthenticated users</title><link href="/cve-2023-50292-apache-solr-schema-designer-blindly-trusts-all-configsets-possibly-leading-to-rce-by-unauthenticated-users.html" rel="alternate"></link><published>2024-02-08T00:00:00+00:00</published><updated>2024-02-08T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2024-02-08:/cve-2023-50292-apache-solr-schema-designer-blindly-trusts-all-configsets-possibly-leading-to-rce-by-unauthenticated-users.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Moderate&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
&lt;li&gt;Apache Solr 9.0.0 before 9.3.0&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Incorrect Permission Assignment for Critical Resource, Improper Control of Dynamically-Managed Code Resources vulnerability in Apache Solr.&lt;/p&gt;
&lt;p&gt;This issue affects Apache Solr: from 8.10.0 through 8 …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Moderate&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
&lt;li&gt;Apache Solr 9.0.0 before 9.3.0&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Incorrect Permission Assignment for Critical Resource, Improper Control of Dynamically-Managed Code Resources vulnerability in Apache Solr.&lt;/p&gt;
&lt;p&gt;This issue affects Apache Solr: from 8.10.0 through 8.11.2, from 9.0.0 before 9.3.0.&lt;/p&gt;
&lt;p&gt;The Schema Designer was introduced to allow users to more easily configure and test new Schemas and configSets.
However, when the feature was created, the "trust" (authentication) of these configSets was not considered.
External library loading is only available to configSets that are "trusted" (created by authenticated users), thus non-authenticated users are unable to perform Remote Code Execution.
Since the Schema Designer loaded configSets without taking their "trust" into account, configSets that were created by unauthenticated users were allowed to load external libraries when used in the Schema Designer.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
Users are recommended to upgrade to version 8.11.3, 9.3.0 or later.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
Skay (reporter)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
JIRA - &lt;a href="https://issues.apache.org/jira/browse/SOLR-16777"&gt;SOLR-16777&lt;/a&gt;&lt;br&gt;
CVE - &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50292"&gt;CVE-2023-50292&lt;/a&gt;&lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2023-50298: Apache Solr can expose ZooKeeper credentials via Streaming Expressions</title><link href="/cve-2023-50298-apache-solr-can-expose-zookeeper-credentials-via-streaming-expressions.html" rel="alternate"></link><published>2024-02-08T00:00:00+00:00</published><updated>2024-02-08T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2024-02-08:/cve-2023-50298-apache-solr-can-expose-zookeeper-credentials-via-streaming-expressions.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Low&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
&lt;li&gt;Apache Solr 9.0.0 before 9.4.1&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9 …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Low&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
&lt;li&gt;Apache Solr 9.0.0 before 9.4.1&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1.&lt;/p&gt;
&lt;p&gt;Solr Streaming Expressions allows users to extract data from other Solr Clouds, using a "zkHost" parameter.
When original SolrCloud is setup to use ZooKeeper credentials and ACLs, they will be sent to whatever "zkHost" the user provides.
An attacker could setup a server to mock ZooKeeper, that accepts ZooKeeper requests with credentials and ACLs and extracts the sensitive information,
then send a streaming expression using the mock server's address in "zkHost".
Streaming Expressions are exposed via the "/streaming" handler, with "read" permissions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the issue.
From these versions on, only zkHost values that have the same server address (regardless of chroot), will use the given ZooKeeper credentials and ACLs when connecting.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
Qing Xu (reporter)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
JIRA - &lt;a href="https://issues.apache.org/jira/browse/SOLR-17098"&gt;SOLR-17098&lt;/a&gt;&lt;br&gt;
CVE - &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50298"&gt;CVE-2023-50298&lt;/a&gt;&lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2023-50386: Apache Solr: Backup/Restore APIs allow for deployment of executables in malicious ConfigSets</title><link href="/cve-2023-50386-apache-solr-backuprestore-apis-allow-for-deployment-of-executables-in-malicious-configsets.html" rel="alternate"></link><published>2024-02-08T00:00:00+00:00</published><updated>2024-02-08T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2024-02-08:/cve-2023-50386-apache-solr-backuprestore-apis-allow-for-deployment-of-executables-in-malicious-configsets.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Moderate&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
&lt;li&gt;Apache Solr 9.0.0 before 9.4.1&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of File with Dangerous Type, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Solr.This issue affects …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Moderate&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
&lt;li&gt;Apache Solr 9.0.0 before 9.4.1&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of File with Dangerous Type, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1.&lt;/p&gt;
&lt;p&gt;In the affected versions, Solr ConfigSets accepted Java jar and class files to be uploaded through the ConfigSets API.
When backing up Solr Collections, these configSet files would be saved to disk when using the LocalFileSystemRepository (the default for backups).
If the backup was saved to a directory that Solr uses in its ClassPath/ClassLoaders, then the jar and class files would be available to use with any ConfigSet, trusted or untrusted.&lt;/p&gt;
&lt;p&gt;When Solr is run in a secure way (Authorization enabled), as is strongly suggested, this vulnerability is limited to extending the Backup permissions with the ability to add libraries.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the issue.
In these versions, the following protections have been added:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Users are no longer able to upload files to a configSet that could be executed via a Java ClassLoader.&lt;/li&gt;
&lt;li&gt;The Backup API restricts saving backups to directories that are used in the ClassLoader.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
L3yx (reporter)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
JIRA - &lt;a href="https://issues.apache.org/jira/browse/SOLR-16949"&gt;SOLR-16949&lt;/a&gt;&lt;br&gt;
CVE - &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50386"&gt;CVE-2023-50386&lt;/a&gt;&lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2023-50290: Apache Solr allows read access to host environment variables</title><link href="/cve-2023-50290-apache-solr-allows-read-access-to-host-environment-variables.html" rel="alternate"></link><published>2024-01-12T00:00:00+00:00</published><updated>2024-01-12T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2024-01-12:/cve-2023-50290-apache-solr-allows-read-access-to-host-environment-variables.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Important&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
Solr 9.0 to 9.2.1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr.
The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance.
Users are able to specify which environment variables to hide, however …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Important&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
Solr 9.0 to 9.2.1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr.
The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance.
Users are able to specify which environment variables to hide, however, the default list is designed to work for known secret Java system properties.
Environment variables cannot be strictly defined in Solr, like Java system properties can be, and may be set for the entire host, unlike Java system properties which are set per-Java-process.&lt;/p&gt;
&lt;p&gt;The Solr Metrics API is protected by the "metrics-read" permission.
Therefore, Solr Clouds with Authorization setup will only be vulnerable via users with the "metrics-read" permission.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
Users are recommended to upgrade to version 9.3.0 or later, in which environment variables are not published via the Metrics API.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
JIRA - &lt;a href="https://issues.apache.org/jira/browse/SOLR-16808"&gt;SOLR-15233&lt;/a&gt;&lt;br&gt;
CVE - &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2023-50290"&gt;CVE-2023-50290&lt;/a&gt;&lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>Apache Solr is vulnerable to CVE-2022-39135 via /sql handler</title><link href="/apache-solr-is-vulnerable-to-cve-2022-39135-via-sql-handler.html" rel="alternate"></link><published>2022-11-20T00:00:00+00:00</published><updated>2022-11-20T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2022-11-20:/apache-solr-is-vulnerable-to-cve-2022-39135-via-sql-handler.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
Solr 6.5 to 8.11.2
Solr 9.0&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Apache Calcite has a vulnerability, CVE-2022-39135, that is exploitable in Apache Solr in SolrCloud mode. If an untrusted user can supply SQL queries to Solr’s “/sql” handler (even indirectly via proxies / other apps), then the user …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
Solr 6.5 to 8.11.2
Solr 9.0&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Apache Calcite has a vulnerability, CVE-2022-39135, that is exploitable in Apache Solr in SolrCloud mode. If an untrusted user can supply SQL queries to Solr’s “/sql” handler (even indirectly via proxies / other apps), then the user could perform an XML External Entity (XXE) attack. This might have been exposed by some deployers of Solr in order for internal analysts to use JDBC based tooling, but would have unlikely been granted to wider audiences.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Impact:&lt;/strong&gt;&lt;br&gt;
An XXE attack may lead to the disclosure of confidential data, denial of service, server side request forgery (SSRF), port scanning from the Solr node, and other system impacts.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
Most Solr installations don’t make use of the SQL functionality. For such users, the standard Solr security advice of using a firewall should be adequate. Nonetheless, the functionality can be disabled. As of Solr 9, it has been modularized and thus became opt-in, so nothing is needed for Solr 9 users that don’t use it. Users &lt;em&gt;not&lt;/em&gt; using SolrCloud can’t use the functionality at all. For other users that wish to disable it, you must register a request handler that masks the underlying functionality in solrconfig.xml like so:&lt;/p&gt;
&lt;div class="codehilite"&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class="err"&gt; &amp;lt;requestHandler name=&amp;quot;/sql&amp;quot; class=&amp;quot;solr.NotFoundRequestHandler&amp;quot;/&amp;gt;&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;
&lt;p&gt;Users needing this SQL functionality are forced to upgrade to Solr 9.1. If Solr 8.11.3 is released, then it will be an option as well. Simply replacing Calcite and other JAR files may mostly work but could fail depending on the particulars of the query. Users interested in this or in patching their own versions of Solr should examine SOLR-16421 for a source patch.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;&lt;br&gt;
Andreas Hubold at CoreMedia GmbH&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
JIRA - &lt;a href="https://issues.apache.org/jira/browse/SOLR-16421"&gt;SOLR-16421&lt;/a&gt;&lt;br&gt;
CVE - &lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2022-39135"&gt;CVE-2022-39135&lt;/a&gt;&lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2021-44548: Apache Solr information disclosure vulnerability through DataImportHandler</title><link href="/cve-2021-44548-apache-solr-information-disclosure-vulnerability-through-dataimporthandler.html" rel="alternate"></link><published>2021-12-18T00:00:00+00:00</published><updated>2021-12-18T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2021-12-18:/cve-2021-44548-apache-solr-information-disclosure-vulnerability-through-dataimporthandler.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Moderate&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
All versions prior to 8.11.1. Affected platforms: Windows.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Moderate&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
All versions prior to 8.11.1. Affected platforms: Windows.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result in:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes),&lt;/li&gt;
&lt;li&gt;In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This issue affects all Apache Solr versions prior to 8.11.1. This issue only affects Windows.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
Upgrade to Solr 8.11.1, and/or ensure only trusted clients can make requests to Solr's DataImport handler.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;&lt;br&gt;
Apache Solr would like to thank LaiHan of Nsfocus security team for reporting the issue&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
Jira issue &lt;a href="https://issues.apache.org/jira/browse/SOLR-15826"&gt;SOLR-15826&lt;/a&gt;&lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>Apache Solr affected by Apache Log4J CVE-2021-44228</title><link href="/apache-solr-affected-by-apache-log4j-cve-2021-44228.html" rel="alternate"></link><published>2021-12-10T00:00:00+00:00</published><updated>2021-12-10T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2021-12-10:/apache-solr-affected-by-apache-log4j-cve-2021-44228.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;
Critical&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
7.4.0 to 7.7.3, 8.0.0 to 8.11.0&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
Apache Solr releases prior to 8.11.1 were using a bundled version of the Apache Log4J library vulnerable to RCE. For full impact and additional detail consult the Log4J security …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;
Critical&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
7.4.0 to 7.7.3, 8.0.0 to 8.11.0&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
Apache Solr releases prior to 8.11.1 were using a bundled version of the Apache Log4J library vulnerable to RCE. For full impact and additional detail consult the Log4J security page.&lt;/p&gt;
&lt;p&gt;Apache Solr releases prior to 7.4 (i.e. Solr 5, Solr 6, and Solr 7 through 7.3) use Log4J 1.2.17 which may be vulnerable for installations using non-default logging configurations that include the JMS Appender, see &lt;a href="https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126"&gt;https://github.com/apache/logging-log4j2/pull/608#issuecomment-990494126&lt;/a&gt; for discussion.&lt;/p&gt;
&lt;p&gt;Solr's Prometheus Exporter uses Log4J as well but it does not log user input or data, so we don't see a risk there.&lt;/p&gt;
&lt;p&gt;Solr is &lt;em&gt;not&lt;/em&gt; vulnerable to the followup &lt;strong&gt;CVE-2021-45046&lt;/strong&gt; and &lt;strong&gt;CVE-2021-45105&lt;/strong&gt;. A listing of these and other CVEs with some justifications are listed in Solr's wiki: &lt;a href="https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity#SolrSecurity-SolrandVulnerabilityScanningTools"&gt;https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity#SolrSecurity-SolrandVulnerabilityScanningTools&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;
Any of the following are enough to prevent this vulnerability for Solr servers:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Upgrade to &lt;code&gt;Solr 8.11.1&lt;/code&gt; or greater (when available), which will include an updated version (&lt;code&gt;&amp;gt;= 2.16.0&lt;/code&gt;) of the Log4J dependency.&lt;/li&gt;
&lt;li&gt;If you are using Solr's official docker image, it has already been mitigated in all versions listed as supported on Docker Hub: &lt;a href="https://hub.docker.com/_/solr"&gt;https://hub.docker.com/_/solr&lt;/a&gt;. You may need to re-pull the image.&lt;/li&gt;
&lt;li&gt;Manually update the version of Log4J on your runtime classpath and restart your Solr application.&lt;/li&gt;
&lt;li&gt;(Linux/MacOS) Edit your &lt;code&gt;solr.in.sh&lt;/code&gt; file to include:
&lt;code&gt;SOLR_OPTS="$SOLR_OPTS -Dlog4j2.formatMsgNoLookups=true"&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;(Windows) Edit your &lt;code&gt;solr.in.cmd&lt;/code&gt; file to include:
&lt;code&gt;set SOLR_OPTS=%SOLR_OPTS% -Dlog4j2.formatMsgNoLookups=true&lt;/code&gt;&lt;/li&gt;
&lt;li&gt;Follow any of the other mitgations listed at &lt;a href="https://logging.apache.org/log4j/2.x/security.html"&gt;https://logging.apache.org/log4j/2.x/security.html&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The Log4J security page refers to setting &lt;code&gt;log4j2.formatMsgNoLookups=true&lt;/code&gt; as a "discredited" mitigation. In reality, it depends.
We've looked at the root cause and audited the code paths that lead to the vulnerability, and we feel confident in this mitigation being sufficient for Solr.
See &lt;a href="https://lists.apache.org/thread/kgh63sncrsm2bls884pg87mnt8vqztmz"&gt;https://lists.apache.org/thread/kgh63sncrsm2bls884pg87mnt8vqztmz&lt;/a&gt; for discussion.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;
&lt;a href="https://logging.apache.org/log4j/2.x/security.html"&gt;https://logging.apache.org/log4j/2.x/security.html&lt;/a&gt;&lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2021-27905: SSRF vulnerability with the Replication handler</title><link href="/cve-2021-27905-ssrf-vulnerability-with-the-replication-handler.html" rel="alternate"></link><published>2021-04-12T00:00:00+00:00</published><updated>2021-04-12T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2021-04-12:/cve-2021-27905-ssrf-vulnerability-with-the-replication-handler.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;
High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
7.0.0 to 7.7.3
8.0.0 to 8.8.1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
The ReplicationHandler (normally registered at "/replication" under a Solr core) has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;
High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
7.0.0 to 7.7.3
8.0.0 to 8.8.1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
The ReplicationHandler (normally registered at "/replication" under a Solr core) has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core.
To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;
Any of the following are enough to prevent this vulnerability:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Upgrade to &lt;code&gt;Solr 8.8.2&lt;/code&gt; or greater.&lt;/li&gt;
&lt;li&gt;If upgrading is not an option, consider applying the patch in &lt;a href="https://issues.apache.org/jira/browse/SOLR-15217"&gt;SOLR-15217&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Ensure that any access to the replication handler is purely internal to Solr. Typically, it's only accessed externally for diagnostic/informational purposes.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
Reported by Caolinhong(Skay) from QI-ANXIN Cert (QI-ANXIN Technology Group Inc.)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;
&lt;a href="https://issues.apache.org/jira/browse/SOLR-15217"&gt;SOLR-15217&lt;/a&gt;: CVE-2021-27905: SSRF vulnerability with the Replication handler&lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2021-29262: Misapplied Zookeeper ACLs can result in leakage of configured authentication and authorization settings</title><link href="/cve-2021-29262-misapplied-zookeeper-acls-can-result-in-leakage-of-configured-authentication-and-authorization-settings.html" rel="alternate"></link><published>2021-04-12T00:00:00+00:00</published><updated>2021-04-12T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2021-04-12:/cve-2021-29262-misapplied-zookeeper-acls-can-result-in-leakage-of-configured-authentication-and-authorization-settings.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;
High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
7.0.0 to 7.7.3
8.0.0 to 8.8.1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
When starting Apache Solr versions prior to 8.8.2, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;
High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
7.0.0 to 7.7.3
8.0.0 to 8.8.1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
When starting Apache Solr versions prior to 8.8.2, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be readable.
Additionally, with any ZkACLProvider, if the security.json is already present, Solr will not automatically update the ACLs.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;
Any of the following are enough to prevent this vulnerability:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Manually set appropriate ACLs on /security.json znode.&lt;/li&gt;
&lt;li&gt;Upgrade to &lt;code&gt;Solr 8.8.2&lt;/code&gt; or greater.&lt;/li&gt;
&lt;li&gt;If upgrading is not an option, consider applying the patch in &lt;a href="https://issues.apache.org/jira/browse/SOLR-15249"&gt;SOLR-15249&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Ensure that any access to zookeeper is only by trusted application.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
Timothy Potter and Mike Drob, Apple Cloud Services&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;
&lt;a href="https://issues.apache.org/jira/browse/SOLR-15249"&gt;SOLR-15249&lt;/a&gt;: CVE-2021-29262: Misapplied Zookeeper ACLs can result in leakage of configured authentication and authorization settings&lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2021-29943: Apache Solr Unprivileged users may be able to perform unauthorized read/write to collections</title><link href="/cve-2021-29943-apache-solr-unprivileged-users-may-be-able-to-perform-unauthorized-readwrite-to-collections.html" rel="alternate"></link><published>2021-04-12T00:00:00+00:00</published><updated>2021-04-12T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2021-04-12:/cve-2021-29943-apache-solr-unprivileged-users-may-be-able-to-perform-unauthorized-readwrite-to-collections.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;
High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
7.0.0 to 7.7.3
8.0.0 to 8.8.1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
When using ConfigurableInternodeAuthHadoopPlugin for authentication, Apache Solr versions prior to 8.8.2 would forward/proxy distributed requests using server credentials instead of original client credentials. This would result in incorrect …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;
High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
7.0.0 to 7.7.3
8.0.0 to 8.8.1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
When using ConfigurableInternodeAuthHadoopPlugin for authentication, Apache Solr versions prior to 8.8.2 would forward/proxy distributed requests using server credentials instead of original client credentials. This would result in incorrect authorization resolution on the receiving hosts.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;
Any of the following are enough to prevent this vulnerability:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Upgrade to &lt;code&gt;Solr 8.8.2&lt;/code&gt; or greater.&lt;/li&gt;
&lt;li&gt;If upgrading is not an option, consider applying the patch in &lt;a href="https://issues.apache.org/jira/browse/SOLR-15233"&gt;SOLR-15233&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Use a different authentication plugin, such as the KerberosPlugin or HadoopAuthPlugin&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
Geza Nagy&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;
&lt;a href="https://issues.apache.org/jira/browse/SOLR-15233"&gt;SOLR-15233&lt;/a&gt;: CVE-2021-29943: Apache Solr Unprivileged users may be able to perform unauthorized read/write to collections &lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2020-13957: The checks added to unauthenticated configset uploads in Apache Solr can be circumvented</title><link href="/cve-2020-13957-the-checks-added-to-unauthenticated-configset-uploads-in-apache-solr-can-be-circumvented.html" rel="alternate"></link><published>2020-10-12T00:00:00+00:00</published><updated>2020-10-12T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2020-10-12:/cve-2020-13957-the-checks-added-to-unauthenticated-configset-uploads-in-apache-solr-can-be-circumvented.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;
High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
6.6.0 to 6.6.6
7.0.0 to 7.7.3
8.0.0 to 8.6.2&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
Solr prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that's uploaded via API …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;
High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
6.6.0 to 6.6.6
7.0.0 to 7.7.3
8.0.0 to 8.6.2&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
Solr prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that's uploaded via API without authentication/authorization. The checks in place to prevent such features can be circumvented by using a combination of UPLOAD/CREATE actions.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;
Any of the following are enough to prevent this vulnerability:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Disable UPLOAD command in ConfigSets API if not used by setting the system property: &lt;code&gt;configset.upload.enabled&lt;/code&gt; to &lt;code&gt;false&lt;/code&gt; (&lt;a href="https://solr.apache.org/guide/8_6/configsets-api.html"&gt;see docs&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Use Authentication/Authorization and make sure unknown requests aren't allowed (&lt;a href="https://solr.apache.org/guide/8_6/authentication-and-authorization-plugins.html"&gt;see docs&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;Upgrade to &lt;code&gt;Solr 8.6.3&lt;/code&gt; or greater.&lt;/li&gt;
&lt;li&gt;If upgrading is not an option, consider applying the patch in &lt;a href="https://issues.apache.org/jira/browse/SOLR-14663"&gt;SOLR-14663&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;No Solr API, including the Admin UI, is designed to be exposed to non-trusted parties. Tune your firewall so that only trusted computers and people are allowed access&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
Tomás Fernández Löbbe, András Salamon&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;
&lt;a href="https://issues.apache.org/jira/browse/SOLR-14925"&gt;SOLR-14925&lt;/a&gt;: CVE-2020-13957: The checks added to unauthenticated configset uploads can be circumvented&lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2020-13941: Apache Solr information disclosure vulnerability</title><link href="/cve-2020-13941-apache-solr-information-disclosure-vulnerability.html" rel="alternate"></link><published>2020-08-14T00:00:00+00:00</published><updated>2020-08-14T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2020-08-14:/cve-2020-13941-apache-solr-information-disclosure-vulnerability.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;
Medium&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
Before Solr 8.6. Some risks are specific to Windows.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
Reported in SOLR-14515 (private) and fixed in SOLR-14561 (public), released in Solr version 8.6.0.
The Replication handler (https://solr.apache.org/guide/8_6/index-replication.html#http-api-commands-for-the-replicationhandler) allows commands backup, restore and deleteBackup. Each …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;
Medium&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
Before Solr 8.6. Some risks are specific to Windows.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;
Reported in SOLR-14515 (private) and fixed in SOLR-14561 (public), released in Solr version 8.6.0.
The Replication handler (https://solr.apache.org/guide/8_6/index-replication.html#http-api-commands-for-the-replicationhandler) allows commands backup, restore and deleteBackup. Each of these take a location parameter, which was not validated, i.e you could read/write to any location the solr user can access. &lt;/p&gt;
&lt;p&gt;On a windows system SMB paths such as \10.0.0.99\share\folder may also be used, leading to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The possibility of restoring another SolrCore from a server on the network (or mounted remote file system) may lead to:&lt;ul&gt;
&lt;li&gt;Exposing search index data that the attacker should otherwise not have access to&lt;/li&gt;
&lt;li&gt;Replacing the index data entirely by loading it from a remote file system that the attacker controls&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;Launching SMB attacks which may result in:&lt;ul&gt;
&lt;li&gt;The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes),&lt;/li&gt;
&lt;li&gt;In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;
Upgrade to Solr 8.6, and/or ensure only trusted clients can make requests of Solr's replication handler.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
Matei "Mal" Badanoiu&lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2019-17558: Apache Solr RCE through VelocityResponseWriter</title><link href="/cve-2019-17558-apache-solr-rce-through-velocityresponsewriter.html" rel="alternate"></link><published>2019-12-30T00:00:00+00:00</published><updated>2019-12-30T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2019-12-30:/cve-2019-17558-apache-solr-rce-through-velocityresponsewriter.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
5.0.0 to 8.3.1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
The affected versions are vulnerable to a Remote Code Execution through the
VelocityResponseWriter. A Velocity template can be provided through
Velocity templates in a configset &lt;code&gt;velocity/&lt;/code&gt; directory or as a parameter.
A user …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
5.0.0 to 8.3.1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
The affected versions are vulnerable to a Remote Code Execution through the
VelocityResponseWriter. A Velocity template can be provided through
Velocity templates in a configset &lt;code&gt;velocity/&lt;/code&gt; directory or as a parameter.
A user defined configset could contain renderable, potentially malicious,
templates. Parameter provided templates are disabled by default, but can
be enabled by setting &lt;code&gt;params.resource.loader.enabled&lt;/code&gt; by defining a
response writer with that setting set to &lt;code&gt;true&lt;/code&gt;. Defining a response
writer requires configuration API access.&lt;/p&gt;
&lt;p&gt;Solr 8.4 removed the params resource loader entirely, and only enables the
configset-provided template rendering when the configset is &lt;code&gt;trusted&lt;/code&gt; (has
been uploaded by an authenticated user).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
Ensure your network settings are configured so that only trusted traffic
communicates with Solr, especially to the configuration APIs.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;&lt;br&gt;
Github user &lt;code&gt;s00py&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://issues.apache.org/jira/browse/SOLR-13971"&gt;https://issues.apache.org/jira/browse/SOLR-13971&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://issues.apache.org/jira/browse/SOLR-14025"&gt;https://issues.apache.org/jira/browse/SOLR-14025&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity"&gt;https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2019-12409: Apache Solr RCE vulnerability due to bad config default</title><link href="/cve-2019-12409-apache-solr-rce-vulnerability-due-to-bad-config-default.html" rel="alternate"></link><published>2019-11-18T00:00:00+00:00</published><updated>2019-11-18T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2019-11-18:/cve-2019-12409-apache-solr-rce-vulnerability-due-to-bad-config-default.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;
High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
Solr 8.1.1 and 8.2.0 for Linux&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
The 8.1.1 and 8.2.0 releases of Apache Solr contain an
insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option
in the default solr.in.sh configuration file shipping …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;
High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
Solr 8.1.1 and 8.2.0 for Linux&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
The 8.1.1 and 8.2.0 releases of Apache Solr contain an
insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option
in the default solr.in.sh configuration file shipping with Solr.&lt;/p&gt;
&lt;p&gt;Windows users are not affected.&lt;/p&gt;
&lt;p&gt;If you use the default solr.in.sh file from the affected releases, then
JMX monitoring will be enabled and exposed on RMI_PORT (default=18983),
without any authentication. If this port is opened for inbound traffic
in your firewall, then anyone with network access to your Solr nodes
will be able to access JMX, which may in turn allow them to upload
malicious code for execution on the Solr server.&lt;/p&gt;
&lt;p&gt;The vulnerability is already public [1] and mitigation steps were
announced on project mailing lists and news page [3] on August 14th,
without mentioning RCE at that time.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
Make sure your effective solr.in.sh file has ENABLE_REMOTE_JMX_OPTS set
to 'false' on every Solr node and then restart Solr. Note that the
effective solr.in.sh file may reside in /etc/defaults/ or another
location depending on the install. You can then validate that the
'com.sun.management.jmxremote*' family of properties are not listed in
the "Java Properties" section of the Solr Admin UI, or configured in a
secure way.&lt;/p&gt;
&lt;p&gt;There is no need to upgrade or update any code.&lt;/p&gt;
&lt;p&gt;Remember to follow the Solr Documentation's advice to never expose Solr
nodes directly in a hostile network environment.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;&lt;br&gt;
Matei "Mal" Badanoiu&lt;br&gt;
Solr JIRA user 'jnyryan' (John)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
[1] https://issues.apache.org/jira/browse/SOLR-13647&lt;br&gt;
[3] https://solr.apache.org/news.html&lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2019-12401: XML Bomb in Apache Solr versions prior to 5.0</title><link href="/cve-2019-12401-xml-bomb-in-apache-solr-versions-prior-to-50.html" rel="alternate"></link><published>2019-09-09T00:00:00+00:00</published><updated>2019-09-09T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2019-09-09:/cve-2019-12401-xml-bomb-in-apache-solr-versions-prior-to-50.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; Medium&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;1.3.0 to 1.4.1&lt;/li&gt;
&lt;li&gt;3.1.0 to 3.6.2&lt;/li&gt;
&lt;li&gt;4.0.0 to 4.10.4&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Solr versions prior to 5.0.0 are vulnerable to an XML resource
consumption attack (a.k.a. Lol …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; Medium&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;1.3.0 to 1.4.1&lt;/li&gt;
&lt;li&gt;3.1.0 to 3.6.2&lt;/li&gt;
&lt;li&gt;4.0.0 to 4.10.4&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Solr versions prior to 5.0.0 are vulnerable to an XML resource
consumption attack (a.k.a. Lol Bomb) via it’s update handler. By leveraging
XML DOCTYPE and ENTITY type elements, the attacker can create a pattern
that will expand when the server parses the XML causing OOMs&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Upgrade to Apache Solr 5.0 or later.&lt;/li&gt;
&lt;li&gt;Ensure your network settings are configured so that only trusted traffic is allowed to post documents to the running Solr instances.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;&lt;br&gt;
Matei "Mal" Badanoiu&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://issues.apache.org/jira/browse/SOLR-13750"&gt;https://issues.apache.org/jira/browse/SOLR-13750&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity"&gt;https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content><category term="solr/security"></category></entry><entry><title>[ANNOUNCE] 8.1.1 and 8.2.0 users check ENABLE_REMOTE_JMX_OPTS setting</title><link href="/announce-811-and-820-users-check-enable_remote_jmx_opts-setting.html" rel="alternate"></link><published>2019-08-14T00:00:00+00:00</published><updated>2019-08-14T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2019-08-14:/announce-811-and-820-users-check-enable_remote_jmx_opts-setting.html</id><summary type="html">&lt;div class="codehilite"&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class="n"&gt;Severity&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt; &lt;span class="n"&gt;Low&lt;/span&gt;
&lt;span class="n"&gt;Versions&lt;/span&gt; &lt;span class="n"&gt;Affected&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;
&lt;span class="mf"&gt;8.1&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt; &lt;span class="n"&gt;and&lt;/span&gt; &lt;span class="mf"&gt;8.2&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt; &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;Linux&lt;/span&gt;
&lt;span class="n"&gt;Description&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;
&lt;span class="n"&gt;It&lt;/span&gt; &lt;span class="n"&gt;has&lt;/span&gt; &lt;span class="n"&gt;been&lt;/span&gt; &lt;span class="n"&gt;discovered&lt;/span&gt; &lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; &lt;span class="n"&gt;that&lt;/span&gt; &lt;span class="n"&gt;the&lt;/span&gt; &lt;span class="mf"&gt;8.1&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt; &lt;span class="n"&gt;and&lt;/span&gt; &lt;span class="mf"&gt;8.2&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt; &lt;span class="n"&gt;releases&lt;/span&gt; &lt;span class="n"&gt;contain&lt;/span&gt; &lt;span class="n"&gt;a&lt;/span&gt; &lt;span class="n"&gt;bad&lt;/span&gt; &lt;span class="k"&gt;default&lt;/span&gt;
&lt;span class="n"&gt;setting&lt;/span&gt; &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;the&lt;/span&gt; &lt;span class="n"&gt;ENABLE_REMOTE_JMX_OPTS&lt;/span&gt; &lt;span class="n"&gt;setting&lt;/span&gt; &lt;span class="k"&gt;in&lt;/span&gt; &lt;span class="n"&gt;the&lt;/span&gt; &lt;span class="k"&gt;default&lt;/span&gt; &lt;span class="n"&gt;solr&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;in&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;sh&lt;/span&gt; &lt;span class="n"&gt;file&lt;/span&gt;
&lt;span class="n"&gt;shipping&lt;/span&gt; &lt;span class="k"&gt;with&lt;/span&gt; &lt;span class="n"&gt;Solr&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;
&lt;span class="n"&gt;Windows&lt;/span&gt; &lt;span class="n"&gt;users …&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</summary><content type="html">&lt;div class="codehilite"&gt;&lt;pre&gt;&lt;span&gt;&lt;/span&gt;&lt;code&gt;&lt;span class="n"&gt;Severity&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt; &lt;span class="n"&gt;Low&lt;/span&gt;
&lt;span class="n"&gt;Versions&lt;/span&gt; &lt;span class="n"&gt;Affected&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;
&lt;span class="mf"&gt;8.1&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt; &lt;span class="n"&gt;and&lt;/span&gt; &lt;span class="mf"&gt;8.2&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt; &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;Linux&lt;/span&gt;
&lt;span class="n"&gt;Description&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;
&lt;span class="n"&gt;It&lt;/span&gt; &lt;span class="n"&gt;has&lt;/span&gt; &lt;span class="n"&gt;been&lt;/span&gt; &lt;span class="n"&gt;discovered&lt;/span&gt; &lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; &lt;span class="n"&gt;that&lt;/span&gt; &lt;span class="n"&gt;the&lt;/span&gt; &lt;span class="mf"&gt;8.1&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt; &lt;span class="n"&gt;and&lt;/span&gt; &lt;span class="mf"&gt;8.2&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt; &lt;span class="n"&gt;releases&lt;/span&gt; &lt;span class="n"&gt;contain&lt;/span&gt; &lt;span class="n"&gt;a&lt;/span&gt; &lt;span class="n"&gt;bad&lt;/span&gt; &lt;span class="k"&gt;default&lt;/span&gt;
&lt;span class="n"&gt;setting&lt;/span&gt; &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;the&lt;/span&gt; &lt;span class="n"&gt;ENABLE_REMOTE_JMX_OPTS&lt;/span&gt; &lt;span class="n"&gt;setting&lt;/span&gt; &lt;span class="k"&gt;in&lt;/span&gt; &lt;span class="n"&gt;the&lt;/span&gt; &lt;span class="k"&gt;default&lt;/span&gt; &lt;span class="n"&gt;solr&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;in&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;sh&lt;/span&gt; &lt;span class="n"&gt;file&lt;/span&gt;
&lt;span class="n"&gt;shipping&lt;/span&gt; &lt;span class="k"&gt;with&lt;/span&gt; &lt;span class="n"&gt;Solr&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;
&lt;span class="n"&gt;Windows&lt;/span&gt; &lt;span class="n"&gt;users&lt;/span&gt; &lt;span class="n"&gt;and&lt;/span&gt; &lt;span class="n"&gt;users&lt;/span&gt; &lt;span class="k"&gt;with&lt;/span&gt; &lt;span class="n"&gt;custom&lt;/span&gt; &lt;span class="n"&gt;solr&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;in&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;sh&lt;/span&gt; &lt;span class="n"&gt;files&lt;/span&gt; &lt;span class="n"&gt;are&lt;/span&gt; &lt;span class="n"&gt;not&lt;/span&gt; &lt;span class="n"&gt;affected&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;
&lt;span class="n"&gt;If&lt;/span&gt; &lt;span class="n"&gt;you&lt;/span&gt; &lt;span class="n"&gt;are&lt;/span&gt; &lt;span class="n"&gt;using&lt;/span&gt; &lt;span class="n"&gt;the&lt;/span&gt; &lt;span class="k"&gt;default&lt;/span&gt; &lt;span class="n"&gt;solr&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;in&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;sh&lt;/span&gt; &lt;span class="n"&gt;file&lt;/span&gt; &lt;span class="n"&gt;from&lt;/span&gt; &lt;span class="n"&gt;the&lt;/span&gt; &lt;span class="n"&gt;affected&lt;/span&gt; &lt;span class="n"&gt;releases&lt;/span&gt;&lt;span class="o"&gt;,&lt;/span&gt; &lt;span class="n"&gt;then&lt;/span&gt;
&lt;span class="n"&gt;JMX&lt;/span&gt; &lt;span class="n"&gt;monitoring&lt;/span&gt; &lt;span class="n"&gt;will&lt;/span&gt; &lt;span class="n"&gt;be&lt;/span&gt; &lt;span class="n"&gt;enabled&lt;/span&gt; &lt;span class="n"&gt;and&lt;/span&gt; &lt;span class="n"&gt;exposed&lt;/span&gt; &lt;span class="n"&gt;on&lt;/span&gt; &lt;span class="n"&gt;JMX_PORT&lt;/span&gt; &lt;span class="o"&gt;(&lt;/span&gt;&lt;span class="k"&gt;default&lt;/span&gt; &lt;span class="o"&gt;=&lt;/span&gt; &lt;span class="mi"&gt;18983&lt;/span&gt;&lt;span class="o"&gt;),&lt;/span&gt;
&lt;span class="n"&gt;without&lt;/span&gt; &lt;span class="n"&gt;any&lt;/span&gt; &lt;span class="n"&gt;authentication&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt; &lt;span class="n"&gt;So&lt;/span&gt; &lt;span class="k"&gt;if&lt;/span&gt; &lt;span class="n"&gt;your&lt;/span&gt; &lt;span class="n"&gt;firewalls&lt;/span&gt; &lt;span class="n"&gt;allows&lt;/span&gt; &lt;span class="n"&gt;inbound&lt;/span&gt; &lt;span class="n"&gt;traffic&lt;/span&gt; &lt;span class="n"&gt;on&lt;/span&gt;
&lt;span class="n"&gt;JMX_PORT&lt;/span&gt;&lt;span class="o"&gt;,&lt;/span&gt; &lt;span class="n"&gt;then&lt;/span&gt; &lt;span class="n"&gt;anyone&lt;/span&gt; &lt;span class="k"&gt;with&lt;/span&gt; &lt;span class="n"&gt;network&lt;/span&gt; &lt;span class="n"&gt;access&lt;/span&gt; &lt;span class="n"&gt;to&lt;/span&gt; &lt;span class="n"&gt;your&lt;/span&gt; &lt;span class="n"&gt;Solr&lt;/span&gt; &lt;span class="n"&gt;nodes&lt;/span&gt; &lt;span class="n"&gt;will&lt;/span&gt; &lt;span class="n"&gt;be&lt;/span&gt; &lt;span class="n"&gt;able&lt;/span&gt; &lt;span class="n"&gt;to&lt;/span&gt;
&lt;span class="n"&gt;access&lt;/span&gt; &lt;span class="n"&gt;monitoring&lt;/span&gt; &lt;span class="n"&gt;data&lt;/span&gt; &lt;span class="n"&gt;exposed&lt;/span&gt; &lt;span class="n"&gt;over&lt;/span&gt; &lt;span class="n"&gt;JMX&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;
&lt;span class="n"&gt;Mitigation&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;
&lt;span class="n"&gt;Edit&lt;/span&gt; &lt;span class="n"&gt;solr&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;in&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;sh&lt;/span&gt;&lt;span class="o"&gt;,&lt;/span&gt; &lt;span class="kd"&gt;set&lt;/span&gt; &lt;span class="n"&gt;ENABLE_REMOTE_JMX_OPTS&lt;/span&gt;&lt;span class="o"&gt;=&lt;/span&gt;&lt;span class="kc"&gt;false&lt;/span&gt; &lt;span class="n"&gt;and&lt;/span&gt; &lt;span class="n"&gt;restart&lt;/span&gt; &lt;span class="n"&gt;Solr&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;
&lt;span class="n"&gt;Alternatively&lt;/span&gt; &lt;span class="n"&gt;wait&lt;/span&gt; &lt;span class="k"&gt;for&lt;/span&gt; &lt;span class="n"&gt;the&lt;/span&gt; &lt;span class="n"&gt;future&lt;/span&gt; &lt;span class="mf"&gt;8.3&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="mi"&gt;0&lt;/span&gt; &lt;span class="n"&gt;release&lt;/span&gt; &lt;span class="n"&gt;and&lt;/span&gt; &lt;span class="n"&gt;upgrade&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;
&lt;span class="n"&gt;References&lt;/span&gt;&lt;span class="o"&gt;:&lt;/span&gt;
&lt;span class="o"&gt;[&lt;/span&gt;&lt;span class="mi"&gt;1&lt;/span&gt;&lt;span class="o"&gt;]&lt;/span&gt; &lt;span class="n"&gt;https&lt;/span&gt;&lt;span class="o"&gt;://&lt;/span&gt;&lt;span class="n"&gt;issues&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;apache&lt;/span&gt;&lt;span class="o"&gt;.&lt;/span&gt;&lt;span class="na"&gt;org&lt;/span&gt;&lt;span class="sr"&gt;/jira/browse/&lt;/span&gt;&lt;span class="n"&gt;SOLR&lt;/span&gt;&lt;span class="o"&gt;-&lt;/span&gt;&lt;span class="mi"&gt;13647&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2019-0193: Apache Solr, Remote Code Execution via DataImportHandler</title><link href="/cve-2019-0193-apache-solr-remote-code-execution-via-dataimporthandler.html" rel="alternate"></link><published>2019-07-31T00:00:00+00:00</published><updated>2019-07-31T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2019-07-31:/cve-2019-0193-apache-solr-remote-code-execution-via-dataimporthandler.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;5.0.0 to 5.5.5&lt;/li&gt;
&lt;li&gt;6.0.0 to 6.6.5&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
The DataImportHandler, an optional but popular module to pull in data from
databases and other sources, has a feature in which the whole DIH
configuration can …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;5.0.0 to 5.5.5&lt;/li&gt;
&lt;li&gt;6.0.0 to 6.6.5&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
The DataImportHandler, an optional but popular module to pull in data from
databases and other sources, has a feature in which the whole DIH
configuration can come from a request's "dataConfig" parameter. The debug
mode of the DIH admin screen uses this to allow convenient debugging /
development of a DIH config. Since a DIH config can contain scripts, this
parameter is a security risk. Starting with version 8.2.0 of Solr, use of
this parameter requires setting the Java System property
&lt;code&gt;enable.dih.dataConfigParam&lt;/code&gt; to true.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Upgrade to 8.2.0 or later, which is secure by default.&lt;/li&gt;
&lt;li&gt;or, edit solrconfig.xml to configure all DataImportHandler usages with an "invariants" section listing the "dataConfig" parameter set to am empty string.&lt;/li&gt;
&lt;li&gt;Ensure your network settings are configured so that only trusted traffic communicates with Solr, especially to the DIH request handler. This is a best practice to all of Solr.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;&lt;br&gt;
Michael Stepankin (JPMorgan Chase)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://issues.apache.org/jira/browse/SOLR-13669"&gt;https://issues.apache.org/jira/browse/SOLR-13669&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity"&gt;https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2019-0192: Deserialization of untrusted data via jmx.serviceUrl in Apache Solr</title><link href="/cve-2019-0192-deserialization-of-untrusted-data-via-jmxserviceurl-in-apache-solr.html" rel="alternate"></link><published>2019-03-06T00:00:00+00:00</published><updated>2019-03-06T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2019-03-06:/cve-2019-0192-deserialization-of-untrusted-data-via-jmxserviceurl-in-apache-solr.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;5.0.0 to 5.5.5&lt;/li&gt;
&lt;li&gt;6.0.0 to 6.6.5&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
ConfigAPI allows to configure Solr's JMX server via an HTTP POST request.
By pointing it to a malicious RMI server, an attacker could take advantage
of …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;5.0.0 to 5.5.5&lt;/li&gt;
&lt;li&gt;6.0.0 to 6.6.5&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
ConfigAPI allows to configure Solr's JMX server via an HTTP POST request.
By pointing it to a malicious RMI server, an attacker could take advantage
of Solr's unsafe deserialization to trigger remote code execution on the
Solr side.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
Any of the following are enough to prevent this vulnerability:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Upgrade to Apache Solr 7.0 or later.&lt;/li&gt;
&lt;li&gt;Disable the ConfigAPI if not in use, by running Solr with the system property “disable.configEdit=true”&lt;/li&gt;
&lt;li&gt;If upgrading or disabling the Config API are not viable options, apply patch in [1] and re-compile Solr.&lt;/li&gt;
&lt;li&gt;Ensure your network settings are configured so that only trusted traffic is allowed to ingress/egress your hosts running Solr.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;&lt;br&gt;
Michael Stepankin&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://issues.apache.org/jira/browse/SOLR-13301"&gt;https://issues.apache.org/jira/browse/SOLR-13301&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity"&gt;https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2017-3164: SSRF issue in Apache Solr</title><link href="/cve-2017-3164-ssrf-issue-in-apache-solr.html" rel="alternate"></link><published>2019-02-12T00:00:00+00:00</published><updated>2019-02-12T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2019-02-12:/cve-2017-3164-ssrf-issue-in-apache-solr.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
Apache Solr versions from 1.3 to 7.6.0&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
The "shards" parameter does not have a corresponding whitelist mechanism,
so it can request any URL.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
Upgrade to Apache Solr 7.7.0 or later.
Ensure your network settings …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; High&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
Apache Solr versions from 1.3 to 7.6.0&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
The "shards" parameter does not have a corresponding whitelist mechanism,
so it can request any URL.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
Upgrade to Apache Solr 7.7.0 or later.
Ensure your network settings are configured so that only trusted traffic is
allowed to ingress/egress your hosts running Solr.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;&lt;br&gt;
dk from Chaitin Tech&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://issues.apache.org/jira/browse/SOLR-12770"&gt;https://issues.apache.org/jira/browse/SOLR-12770&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity"&gt;https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2018-1308: XXE attack through Apache Solr's DIH's dataConfig request parameter</title><link href="/cve-2018-1308-xxe-attack-through-apache-solrs-dihs-dataconfig-request-parameter.html" rel="alternate"></link><published>2018-04-08T00:00:00+00:00</published><updated>2018-04-08T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2018-04-08:/cve-2018-1308-xxe-attack-through-apache-solrs-dihs-dataconfig-request-parameter.html</id><summary type="html">&lt;p&gt;CVE-2018-1308: XXE attack through Apache Solr's DIH's dataConfig request parameter&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; Major&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Solr 1.2 to 6.6.2&lt;/li&gt;
&lt;li&gt;Solr 7.0.0 to 7.2.1&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
The details of this vulnerability were reported to the Apache Security mailing list. &lt;/p&gt;
&lt;p&gt;This vulnerability …&lt;/p&gt;</summary><content type="html">&lt;p&gt;CVE-2018-1308: XXE attack through Apache Solr's DIH's dataConfig request parameter&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; Major&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Solr 1.2 to 6.6.2&lt;/li&gt;
&lt;li&gt;Solr 7.0.0 to 7.2.1&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
The details of this vulnerability were reported to the Apache Security mailing list. &lt;/p&gt;
&lt;p&gt;This vulnerability relates to an XML external entity expansion (XXE) in the
&lt;code&gt;&amp;amp;dataConfig=&amp;lt;inlinexml&amp;gt;&lt;/code&gt; parameter of Solr's DataImportHandler. It can be
used as XXE using file/ftp/http protocols in order to read arbitrary local
files from the Solr server or the internal network. See [1] for more details.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
Users are advised to upgrade to either Solr 6.6.3 or Solr 7.3.0 releases both
of which address the vulnerability. Once upgrade is complete, no other steps
are required. Those releases disable external entities in anonymous XML files
passed through this request parameter. &lt;/p&gt;
&lt;p&gt;If users are unable to upgrade to Solr 6.6.3 or Solr 7.3.0 then they are
advised to disable data import handler in their solrconfig.xml file and
restart their Solr instances. Alternatively, if Solr instances are only used
locally without access to public internet, the vulnerability cannot be used
directly, so it may not be required to update, and instead reverse proxies or
Solr client applications should be guarded to not allow end users to inject
&lt;code&gt;dataConfig&lt;/code&gt; request parameters. Please refer to [2] on how to correctly
secure Solr servers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;&lt;br&gt;
麦 香浓郁&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;[1] &lt;a href="https://issues.apache.org/jira/browse/SOLR-11971"&gt;https://issues.apache.org/jira/browse/SOLR-11971&lt;/a&gt;&lt;br&gt;
[2] &lt;a href="https://cwiki.apache.org/confluence/display/solr/SolrSecurity"&gt;https://cwiki.apache.org/confluence/display/solr/SolrSecurity&lt;/a&gt;&lt;/p&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2016-6809: Java code execution for serialized objects embedded in MATLAB files parsed by Apache Solr using Tika</title><link href="/cve-2016-6809-java-code-execution-for-serialized-objects-embedded-in-matlab-files-parsed-by-apache-solr-using-tika.html" rel="alternate"></link><published>2017-10-26T00:00:00+00:00</published><updated>2017-10-26T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2017-10-26:/cve-2016-6809-java-code-execution-for-serialized-objects-embedded-in-matlab-files-parsed-by-apache-solr-using-tika.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; Important&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Solr 5.0.0 to 5.5.4&lt;/li&gt;
&lt;li&gt;Solr 6.0.0 to 6.6.1&lt;/li&gt;
&lt;li&gt;Solr 7.0.0 to 7.0.1&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Apache Solr uses Apache Tika for parsing binary file types such as
doc, xls, pdf etc …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; Important&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Solr 5.0.0 to 5.5.4&lt;/li&gt;
&lt;li&gt;Solr 6.0.0 to 6.6.1&lt;/li&gt;
&lt;li&gt;Solr 7.0.0 to 7.0.1&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Apache Solr uses Apache Tika for parsing binary file types such as
doc, xls, pdf etc. Apache Tika wraps the jmatio parser
(https://github.com/gradusnikov/jmatio) to handle MATLAB files. The
parser uses native deserialization on serialized Java objects embedded
in MATLAB files. A malicious user could inject arbitrary code into a
MATLAB file that would be executed when the object is deserialized.&lt;/p&gt;
&lt;p&gt;This vulnerability was originally described at
http://mail-archives.apache.org/mod_mbox/tika-user/201611.mbox/%3C2125912914.1308916.1478787314903%40mail.yahoo.com%3E&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
Users are advised to upgrade to either Solr 5.5.5 or Solr 6.6.2 or Solr 7.1.0
releases which have fixed this vulnerability.&lt;/p&gt;
&lt;p&gt;Solr 5.5.5 upgrades the jmatio parser to v1.2 and disables the Java
deserialisation support to protect against this vulnerability.&lt;/p&gt;
&lt;p&gt;Solr 6.6.2 and Solr 7.1.0 have upgraded the bundled Tika to v1.16.&lt;/p&gt;
&lt;p&gt;Once upgrade is complete, no other steps are required.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://issues.apache.org/jira/browse/SOLR-11486"&gt;https://issues.apache.org/jira/browse/SOLR-11486&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://issues.apache.org/jira/browse/SOLR-10335"&gt;https://issues.apache.org/jira/browse/SOLR-10335&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cwiki.apache.org/confluence/display/solr/SolrSecurity"&gt;https://cwiki.apache.org/confluence/display/solr/SolrSecurity&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content><category term="solr/security"></category></entry><entry><title>Several critical vulnerabilities discovered in Apache Solr (XXE &amp; RCE)</title><link href="/several-critical-vulnerabilities-discovered-in-apache-solr-xxe-rce.html" rel="alternate"></link><published>2017-10-18T00:00:00+00:00</published><updated>2017-10-18T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2017-10-18:/several-critical-vulnerabilities-discovered-in-apache-solr-xxe-rce.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Critical&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Solr 5.5.0 to 5.5.4&lt;/li&gt;
&lt;li&gt;Solr 6.0.0 to 6.6.1&lt;/li&gt;
&lt;li&gt;Solr 7.0.0 to 7.0.1&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
The details of this vulnerability were reported on public mailing
lists. See https://s.apache.org …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
Critical&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Solr 5.5.0 to 5.5.4&lt;/li&gt;
&lt;li&gt;Solr 6.0.0 to 6.6.1&lt;/li&gt;
&lt;li&gt;Solr 7.0.0 to 7.0.1&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
The details of this vulnerability were reported on public mailing
lists. See https://s.apache.org/FJDl&lt;/p&gt;
&lt;p&gt;The first vulnerability relates to XML external entity expansion in
the XML Query Parser which is available, by default, for any query
request with parameters deftype=xmlparser. This can be exploited to
upload malicious data to the /upload request handler. It can also be
used as Blind XXE using ftp wrapper in order to read arbitrary local
files from the solr server.&lt;/p&gt;
&lt;p&gt;The second vulnerability relates to remote code execution using the
RunExecutableListener available on all affected versions of Solr.&lt;/p&gt;
&lt;p&gt;At the time of the above report, this was a 0-day vulnerability with a
working exploit affecting the versions of Solr mentioned in the
previous section. However, mitigation steps were announced to protect
Solr users the same day. See
https://solr.apache.org/news.html#12-october-2017-please-secure-your-apache-solr-servers-since-a-zero-day-exploit-has-been-reported-on-a-public-mailing-list&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
Users are advised to upgrade to either Solr 6.6.2 or Solr 7.1.0
releases both of which address the two vulnerabilities. Once upgrade is
complete, no other steps are required.&lt;/p&gt;
&lt;p&gt;If users are unable to upgrade to Solr 6.6.2 or Solr 7.1.0 then they
are advised to restart their Solr instances with the system parameter
&lt;code&gt;-Ddisable.configEdit=true&lt;/code&gt;. This will disallow any changes to be made
to your configurations via the Config API. This is a key factor in
this vulnerability, since it allows GET requests to add the
RunExecutableListener to your config. Users are also advised to re-map
the XML Query Parser to another parser to mitigate the XXE
vulnerability. For example, adding the following to the solrconfig.xml
file re-maps the xmlparser to the edismax parser:
&lt;code&gt;&amp;lt;queryParser name="xmlparser" class="solr.ExtendedDismaxQParserPlugin"/&amp;gt;&lt;/code&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Michael Stepankin (JPMorgan Chase)&lt;/li&gt;
&lt;li&gt;Olga Barinova (Gotham Digital Science)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://issues.apache.org/jira/browse/SOLR-11482"&gt;https://issues.apache.org/jira/browse/SOLR-11482&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://issues.apache.org/jira/browse/SOLR-11477"&gt;https://issues.apache.org/jira/browse/SOLR-11477&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cwiki.apache.org/confluence/display/solr/SolrSecurity"&gt;https://cwiki.apache.org/confluence/display/solr/SolrSecurity&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content><category term="solr/security"></category></entry><entry><title>Please secure your Apache Solr servers since a zero-day exploit has been reported on a public mailing list</title><link href="/solr-security-please-secure-your-apache-solr-servers-since-a-zero-day-exploit-has-been-reported-on-a-public-mailing-list.html" rel="alternate"></link><published>2017-10-12T00:00:00+00:00</published><updated>2017-10-12T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2017-10-12:/solr-security-please-secure-your-apache-solr-servers-since-a-zero-day-exploit-has-been-reported-on-a-public-mailing-list.html</id><summary type="html">&lt;p&gt;Please secure your Solr servers since a zero-day exploit has been
reported on a &lt;a href="https://s.apache.org/FJDl"&gt;public mailing list&lt;/a&gt;.
This has been assigned a public CVE (CVE-2017-12629) which we
will reference in future communication about resolution and mitigation
steps.&lt;/p&gt;
&lt;p&gt;Here is what we're recommending and what we're doing now:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Until fixes are …&lt;/p&gt;&lt;/li&gt;&lt;/ul&gt;</summary><content type="html">&lt;p&gt;Please secure your Solr servers since a zero-day exploit has been
reported on a &lt;a href="https://s.apache.org/FJDl"&gt;public mailing list&lt;/a&gt;.
This has been assigned a public CVE (CVE-2017-12629) which we
will reference in future communication about resolution and mitigation
steps.&lt;/p&gt;
&lt;p&gt;Here is what we're recommending and what we're doing now:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Until fixes are available, all Solr users are advised to restart their
Solr instances with the system property &lt;code&gt;-Ddisable.configEdit=true&lt;/code&gt;.
This will disallow any changes to be made to configurations via the
Config API. This is a key factor in this vulnerability, since it allows
GET requests to add the RunExecutableListener to the config. This is
sufficient to protect you from this type of attack, but means you cannot
use the edit capabilities of the Config API until the other fixes
described below are in place. Users are also advised to remap
the XML Query Parser to another parser to mitigate the XXE
vulnerability. For example, adding the following to the solrconfig.xml
file maps the &lt;code&gt;xmlparser&lt;/code&gt; to the &lt;code&gt;edismax&lt;/code&gt; parser:
&lt;code&gt;&amp;lt;queryParser name="xmlparser" class="solr.ExtendedDismaxQParserPlugin"/&amp;gt;&lt;/code&gt;.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;A new release of Lucene/Solr was in the vote phase, but we have now
pulled it back to be able to address these issues in the upcoming 7.1
release. We will also determine mitigation steps for users on earlier
versions, which may include a 6.6.2 release for users still on 6.x.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The RunExecutableListener will be removed in 7.1. It was previously
used by Solr for index replication but has been replaced and is no
longer needed.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The XML Parser will be fixed and the fixes will be included in the 7.1
release.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;The 7.1 release was already slated to include a change to disable the
&lt;code&gt;stream.body&lt;/code&gt; parameter by default, which will further help protect
systems.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2017-9803: Security vulnerability in kerberos delegation token functionality**</title><link href="/cve-2017-9803-security-vulnerability-in-kerberos-delegation-token-functionality.html" rel="alternate"></link><published>2017-09-18T00:00:00+00:00</published><updated>2017-09-18T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2017-09-18:/cve-2017-9803-security-vulnerability-in-kerberos-delegation-token-functionality.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;CVE-2017-9803: Security vulnerability in kerberos delegation token functionality&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;: Important&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor&lt;/strong&gt;:&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected&lt;/strong&gt;:&lt;br&gt;
Solr 6.2.0 to 6.6.0&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;Solr's Kerberos plugin can be configured to use delegation tokens, which allows an application to reuse the authentication of an end-user or another application …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;CVE-2017-9803: Security vulnerability in kerberos delegation token functionality&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;: Important&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor&lt;/strong&gt;:&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected&lt;/strong&gt;:&lt;br&gt;
Solr 6.2.0 to 6.6.0&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;:&lt;/p&gt;
&lt;p&gt;Solr's Kerberos plugin can be configured to use delegation tokens, which allows an application to reuse the authentication of an end-user or another application.
There are two issues with this functionality (when using SecurityAwareZkACLProvider type of ACL provider e.g. SaslZkACLProvider),&lt;/p&gt;
&lt;p&gt;Firstly, access to the security configuration can be leaked to users other than the solr super user. Secondly, malicious users can exploit this leaked configuration for privilege escalation to further expose/modify private data and/or disrupt operations in the Solr cluster.&lt;/p&gt;
&lt;p&gt;The vulnerability is fixed from Solr 6.6.1 onwards.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation&lt;/strong&gt;:&lt;br&gt;
6.x users should upgrade to 6.6.1&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Credit&lt;/strong&gt;:&lt;br&gt;
This issue was discovered by Hrishikesh Gadre of Cloudera Inc.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://issues.apache.org/jira/browse/SOLR-11184"&gt;https://issues.apache.org/jira/browse/SOLR-11184&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cwiki.apache.org/confluence/display/solr/SolrSecurity"&gt;https://cwiki.apache.org/confluence/display/solr/SolrSecurity&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2017-7660: Security Vulnerability in secure inter-node communication in Apache Solr**</title><link href="/cve-2017-7660-security-vulnerability-in-secure-inter-node-communication-in-apache-solr.html" rel="alternate"></link><published>2017-07-07T00:00:00+00:00</published><updated>2017-07-07T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2017-07-07:/cve-2017-7660-security-vulnerability-in-secure-inter-node-communication-in-apache-solr.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;CVE-2017-7660: Security Vulnerability in secure inter-node communication in Apache Solr&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;: Important&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor&lt;/strong&gt;:&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected&lt;/strong&gt;: &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Solr 5.3 to 5.5.4&lt;/li&gt;
&lt;li&gt;Solr 6.0 to 6.5.1&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Solr uses a PKI based mechanism to secure inter-node communication
when security is enabled. It is …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;CVE-2017-7660: Security Vulnerability in secure inter-node communication in Apache Solr&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;: Important&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor&lt;/strong&gt;:&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected&lt;/strong&gt;: &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Solr 5.3 to 5.5.4&lt;/li&gt;
&lt;li&gt;Solr 6.0 to 6.5.1&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
Solr uses a PKI based mechanism to secure inter-node communication
when security is enabled. It is possible to create a specially crafted
node name that does not exist as part of the cluster and point it to a
malicious node. This can trick the nodes in cluster to believe that
the malicious node is a member of the cluster. So, if Solr users have
enabled BasicAuth authentication mechanism using the BasicAuthPlugin
or if the user has implemented a custom Authentication plugin, which
does not implement either "HttpClientInterceptorPlugin" or
"HttpClientBuilderPlugin", his/her servers are vulnerable to this
attack. Users who only use SSL without basic authentication or those
who use Kerberos are not affected.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;6.x users should upgrade to 6.6.0 or higher&lt;/li&gt;
&lt;li&gt;5.x users should obtain the latest source from git and apply this patch:
&lt;a href="http://git-wip-us.apache.org/repos/asf/lucene-solr/commit/2f5ecbcf"&gt;http://git-wip-us.apache.org/repos/asf/lucene-solr/commit/2f5ecbcf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Credit&lt;/strong&gt;:&lt;br&gt;
This issue was discovered by Noble Paul of Lucidworks Inc.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://issues.apache.org/jira/browse/SOLR-10624"&gt;https://issues.apache.org/jira/browse/SOLR-10624&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cwiki.apache.org/confluence/display/solr/SolrSecurity"&gt;https://cwiki.apache.org/confluence/display/solr/SolrSecurity&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2017-3163: Apache Solr ReplicationHandler path traversal attack**</title><link href="/cve-2017-3163-apache-solr-replicationhandler-path-traversal-attack.html" rel="alternate"></link><published>2017-02-15T00:00:00+00:00</published><updated>2017-02-15T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2017-02-15:/cve-2017-3163-apache-solr-replicationhandler-path-traversal-attack.html</id><summary type="html">&lt;p&gt;&lt;strong&gt;CVE-2017-3163: Apache Solr ReplicationHandler path traversal attack&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; Moderate&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
Solr 1.4 to 6.4.0&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
When using the Index Replication feature, Solr nodes can pull index files from
a master/leader node using an HTTP API which accepts a file name …&lt;/p&gt;</summary><content type="html">&lt;p&gt;&lt;strong&gt;CVE-2017-3163: Apache Solr ReplicationHandler path traversal attack&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt; Moderate&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Vendor:&lt;/strong&gt;&lt;br&gt;
The Apache Software Foundation&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
Solr 1.4 to 6.4.0&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
When using the Index Replication feature, Solr nodes can pull index files from
a master/leader node using an HTTP API which accepts a file name. However,
Solr did not validate the file name, hence it was possible to craft a special
request involving path traversal, leaving any file readable to the Solr server
process exposed. Solr servers protected and restricted by firewall rules
and/or authentication would not be at risk since only trusted clients and users
would gain direct HTTP access.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;6.x users should upgrade to 6.4.1&lt;/li&gt;
&lt;li&gt;5.x users should upgrade to 5.5.4&lt;/li&gt;
&lt;li&gt;4.x, 3.x and 1.4 users should upgrade to a supported version of Solr or setup proper firewalling, or disable the ReplicationHandler if not in use.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;&lt;br&gt;
This issue was discovered by Hrishikesh Gadre of Cloudera Inc.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://issues.apache.org/jira/browse/SOLR-10031"&gt;https://issues.apache.org/jira/browse/SOLR-10031&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cwiki.apache.org/confluence/display/solr/SolrSecurity"&gt;https://cwiki.apache.org/confluence/display/solr/SolrSecurity&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;</content><category term="solr/security"></category></entry><entry><title>CVE-2014-3529, CVE-2014-3574: Recommendation to update Apache POI in Apache Solr 4.8.0, 4.8.1, and 4.9.0 installations</title><link href="/" rel="alternate"></link><published>2014-08-18T00:00:00+00:00</published><updated>2014-08-18T00:00:00+00:00</updated><author><name>Solr Developers</name></author><id>tag:None,2014-08-18:/</id><summary type="html">&lt;p&gt;Apache Solr versions 4.8.0, 4.8.1, 4.9.0 bundle Apache POI 3.10-beta2 with its binary release tarball.
This version (and all previous ones) of Apache POI are vulnerable to the following issues:&lt;/p&gt;
&lt;h3 id="cve-2014-3529-xml-external-entity-xxe-problem-in-apache-pois-openxml-parser"&gt;CVE-2014-3529: XML External Entity (XXE) problem in Apache POI's OpenXML parser&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Information disclosure …&lt;/em&gt;&lt;/p&gt;</summary><content type="html">&lt;p&gt;Apache Solr versions 4.8.0, 4.8.1, 4.9.0 bundle Apache POI 3.10-beta2 with its binary release tarball.
This version (and all previous ones) of Apache POI are vulnerable to the following issues:&lt;/p&gt;
&lt;h3 id="cve-2014-3529-xml-external-entity-xxe-problem-in-apache-pois-openxml-parser"&gt;CVE-2014-3529: XML External Entity (XXE) problem in Apache POI's OpenXML parser&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Information disclosure:&lt;/em&gt; Apache POI uses Java's XML components to parse OpenXML files produced by Microsoft Office products (DOCX, XLSX, PPTX,...).
Applications that accept such files from end-users are vulnerable to XML External Entity (XXE) attacks, which allows remote attackers to bypass
security restrictions and read arbitrary files via a crafted OpenXML document that provides an XML external entity declaration in conjunction
with an entity reference.&lt;/p&gt;
&lt;h3 id="cve-2014-3574-xml-entity-expansion-xee-problem-in-apache-pois-openxml-parser"&gt;CVE-2014-3574: XML Entity Expansion (XEE) problem in Apache POI's OpenXML parser&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;Denial of service:&lt;/em&gt; Apache POI uses Java's XML components and Apache Xmlbeans to parse OpenXML files produced by Microsoft Office products
(DOCX, XLSX, PPTX,...). Applications that accept such files from end-users are vulnerable to XML Entity Expansion (XEE) attacks ("XML bombs"),
which allows remote hackers to consume large amounts of CPU resources.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Apache POI PMC released a bugfix version (3.10.1) today.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Solr users are affected by these issues, if they enable the "Apache Solr Content Extraction Library (Solr Cell)"
contrib module from the folder "contrib/extraction" of the release tarball.&lt;/p&gt;
&lt;p&gt;Users of Apache Solr are strongly advised to keep the module disabled if they don't use it.
Alternatively, users of Apache Solr 4.8.0, 4.8.1, or 4.9.0 can update the affected libraries by
replacing the vulnerable JAR files in the distribution folder. Users of previous versions have
to update their Solr release first, patching older versions is impossible.&lt;/p&gt;
&lt;h3 id="to-replace-the-vulnerable-jar-files-follow-these-steps"&gt;To replace the vulnerable JAR files follow these steps:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;p&gt;Download the &lt;a href="http://poi.apache.org/download.html#POI-3.10.1"&gt;Apache POI 3.10.1&lt;/a&gt; binary release.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Unzip the archive.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Delete the following files in your "solr-4.X.X/contrib/extraction/lib" folder:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;poi-3.10-beta2.jar&lt;/li&gt;
&lt;li&gt;poi-ooxml-3.10-beta2.jar&lt;/li&gt;
&lt;li&gt;poi-ooxml-schemas-3.10-beta2.jar&lt;/li&gt;
&lt;li&gt;poi-scratchpad-3.10-beta2.jar&lt;/li&gt;
&lt;li&gt;xmlbeans-2.3.0.jar&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Copy the following files from the base folder of the Apache POI distribution to the "solr-4.X.X/contrib/extraction/lib" folder:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;poi-3.10.1-20140818.jar&lt;/li&gt;
&lt;li&gt;poi-ooxml-3.10.1-20140818.jar&lt;/li&gt;
&lt;li&gt;poi-ooxml-schemas-3.10.1-20140818.jar&lt;/li&gt;
&lt;li&gt;poi-scratchpad-3.10.1-20140818.jar&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Copy "xmlbeans-2.6.0.jar" from POI's "ooxml-lib/" folder to the "solr-4.X.X/contrib/extraction/lib" folder.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Verify that the "solr-4.X.X/contrib/extraction/lib" no longer contains any files with version number "3.10-beta2".&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Verify that the folder contains one xmlbeans JAR file with version 2.6.0.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;If you just want to disable extraction of Microsoft Office documents, delete the files above and don't replace them.
"Solr Cell" will automatically detect this and disable Microsoft Office document extraction.&lt;/p&gt;
&lt;p&gt;Coming versions of Apache Solr will have the updated libraries bundled.&lt;/p&gt;</content><category term="solr/security"></category></entry></feed>