Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-8026

Опубликовано: 05 июн. 2018
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated files can be uploaded as configsets using Solr's API, allowing to exploit that vulnerability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
JBoss Developer Studio 11solrNot affected
Red Hat Fuse 7camel-solrNot affected
Red Hat JBoss Data Grid 6solr-coreNot affected
Red Hat JBoss Data Virtualization 6solr-coreNot affected
Red Hat JBoss Enterprise Application Platform 6solr-coreNot affected
Red Hat JBoss Fuse 6solr-coreNot affected
Red Hat JBoss Fuse Service Works 6solr-coreNot affected
Red Hat Virtualization 4eap7-lucene-solrNot affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-611
https://bugzilla.redhat.com/show_bug.cgi?id=1598621solr: XML external entity expansion in config files allows for arbitrary file read

EPSS

Процентиль: 89%
0.04341
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
больше 7 лет назад

This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated files can be uploaded as configsets using Solr's API, allowing to exploit that vulnerability.

CVSS3: 5.5
nvd
больше 7 лет назад

This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated files can be uploaded as configsets using Solr's API, allowing to exploit that vulnerability.

CVSS3: 5.5
debian
больше 7 лет назад

This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 re ...

CVSS3: 5.5
github
больше 7 лет назад

XML external entity expansion in org.apache.solr:solr-core

EPSS

Процентиль: 89%
0.04341
Низкий

6.5 Medium

CVSS3