3/6/2023 0 Comments Apache lucene cve![]() ![]() (Linux/MacOS) Edit your solr.in.sh file to include:.Manually update the version of Log4J on your runtime classpath and restart your Solr application.If you are using Solr's official docker image, it has already been mitigated in all versions listed as supported on Docker Hub.Upgrade to Solr 8.11.1 or greater (when available), which will include an updated version ( >= 2.16.0) of the Log4J dependency.A listing of these and other CVEs with some justifications are listed in Solr's wiki: Īny of the following are enough to prevent this vulnerability for Solr servers: Solr's Prometheus Exporter uses Log4J as well but it does not log user input or data, so we don't see a risk there. Solr 5, Solr 6, and Solr 7 through 7.3) use Log4J 1.2.17 which may be vulnerable for installations using non-default logging configurations that include the JMS Appender, see for discussion. For full impact and additional detail consult the Log4J security page.Īpache Solr releases prior to 7.4 (i.e. Jira issue SOLR-15826, Apache Solr affected by Apache Log4J CVE-2021-44228Īpache Solr releases prior to 8.11.1 were using a bundled version of the Apache Log4J library vulnerable to RCE. Upgrade to Solr 8.11.1, and/or ensure only trusted clients can make requests to Solr's DataImport handler.Īpache Solr would like to thank LaiHan of Nsfocus security team for reporting the issue This issue affects all Apache Solr versions prior to 8.11.1. In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution.The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes),.If the attacker has wider access to the network, this may lead to SMB attacks, which may result in: Affected platforms: Windows.Īn Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. , CVE-2021-44548: Apache Solr information disclosure vulnerability through DataImportHandlerĪll versions prior to 8.11.1. XXE attack through Apache Solr's DIH's dataConfig request parameter 8.1.1 and 8.2.0 users check ENABLE_REMOTE_JMX_OPTS settingĪpache Solr, Remote Code Execution via DataImportHandlerĭeserialization of untrusted data via jmx.serviceUrl in Apache Solr XML Bomb in Apache Solr versions prior to 5.0 The checks added to unauthenticated configset uploads in Apache Solr can be circumventedĪpache Solr information disclosure vulnerabilityĪpache Solr RCE through VelocityResponseWriterĪpache Solr RCE vulnerability due to bad config default ![]() Misapplied Zookeeper ACLs can result in leakage of configured authentication and authorization settingsĪpache Solr Unprivileged users may be able to perform unauthorized read/write to collections SSRF vulnerability with the Replication handler These are also available as an ATOM feed: CVE#Īpache Solr information disclosure vulnerability through DataImportHandlerĪpache Solr affected by Apache Log4J CVE-2021-44228 Recent CVE reports for Apache Solrīelow is a list of already announced CVE vulnerabilities. ![]() You will find more security related information on our Wiki:, such as information on how to treat the automated reports from security scanning tools. You may file your request by email to More information Then please disclose responsibly by following these ASF guidelines for reporting. The Solr PMC greatly appreciates the reporting of security vulnerabilities found in Solr itself.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |