Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-3164

Опубликовано: 08 мар. 2019
Источник: debian
EPSS Средний

Описание

Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to any reachable URL.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lucene-solrunfixedpackage

Примечания

  • https://issues.apache.org/jira/browse/SOLR-12770

EPSS

Процентиль: 98%
0.61144
Средний

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 7 лет назад

Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to any reachable URL.

CVSS3: 7.5
nvd
почти 7 лет назад

Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to any reachable URL.

CVSS3: 7.5
github
почти 7 лет назад

Server-Side Request Forgery (SSRF) in org.apache.solr:solr-core

EPSS

Процентиль: 98%
0.61144
Средний