Описание
This vulnerability in Apache Solr 1.2 to 6.6.2 and 7.0.0 to 7.2.1 relates to an XML external entity expansion (XXE) in the `&dataConfig=<inlinexml>` parameter of Solr's DataImportHandler. It can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network.
Пакеты
| Пакет | Статус | Версия исправления | Релиз | Тип |
|---|---|---|---|---|
| lucene-solr | fixed | 3.6.2+dfsg-12 | package |
Примечания
https://www.openwall.com/lists/oss-security/2018/04/08/3
https://issues.apache.org/jira/browse/SOLR-11971
master: http://git-wip-us.apache.org/repos/asf/lucene-solr/commit/02c693f3
branch_7x: http://git-wip-us.apache.org/repos/asf/lucene-solr/commit/739a7933
branch_6_6: http://git-wip-us.apache.org/repos/asf/lucene-solr/commit/dd3be31f
EPSS
Связанные уязвимости
This vulnerability in Apache Solr 1.2 to 6.6.2 and 7.0.0 to 7.2.1 relates to an XML external entity expansion (XXE) in the `&dataConfig=<inlinexml>` parameter of Solr's DataImportHandler. It can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network.
This vulnerability in Apache Solr 1.2 to 6.6.2 and 7.0.0 to 7.2.1 relates to an XML external entity expansion (XXE) in the `&dataConfig=<inlinexml>` parameter of Solr's DataImportHandler. It can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network.
This vulnerability in Apache Solr 1.2 to 6.6.2 and 7.0.0 to 7.2.1 relates to an XML external entity expansion (XXE) in the `&dataConfig=<inlinexml>` parameter of Solr's DataImportHandler. It can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network.
There is a XML external entity expansion (XXE) vulnerability in Apache Solr
EPSS