Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-24814

Опубликовано: 27 янв. 2025
Источник: redhat
CVSS3: 4.6

Описание

Core creation allows users to replace "trusted" configset files with arbitrary configuration Solr instances that (1) use the "FileSystemConfigSetService" component (the default in "standalone" or "user-managed" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual "trusted" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem.  These replacement config files are treated as "trusted" and can use "" tags to add to Solr's classpath, which an attacker might use to load malicious code as a searchComponent or other plugin. This issue affects all Apache Solr versions up through Solr 9.7.  Users can protect against the vulnerability by enabling authentication and authorization on their Solr clusters or switching to SolrCloud (and away from "FileSystemConfigSetService").  Users are also recommended to upgrade to Solr 9.8.0, which mitigates this issue by disabling use of "" tags by default.

A flaw was found in Apache Solr. Solr instances that use the "FileSystemConfigSetService" component, the default in "standalone" or "user-managed" mode, and are running without authentication and authorization are vulnerable to a privilege escalation wherein individual "trusted" config set files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem.  These replacement config files are treated as "trusted" and can use "" tags to add to Solr's classpath. This flaw allows an attacker to load malicious code as a searchComponent or other plugin.

Меры по смягчению последствий

Users can protect against the vulnerability by enabling authentication and authorization on their Solr clusters or switching to SolrCloud (and away from "FileSystemConfigSetService").

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Fuse 7org.apache.solr/solr-coreOut of support scope
Red Hat Integration Camel K 1org.apache.solr/solr-coreFix deferred
Red Hat JBoss Enterprise Application Platform 8org.apache.solr/solr-coreFix deferred
Red Hat JBoss Enterprise Application Platform Expansion Packorg.apache.solr/solr-coreFix deferred

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-250
https://bugzilla.redhat.com/show_bug.cgi?id=2342221solr: org.apache.solr: Apache Solr: Core-creation with "trusted" configset can use arbitrary untrusted files

4.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 5.5
ubuntu
11 месяцев назад

Core creation allows users to replace "trusted" configset files with arbitrary configuration Solr instances that (1) use the "FileSystemConfigSetService" component (the default in "standalone" or "user-managed" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual "trusted" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem.  These replacement config files are treated as "trusted" and can use "<lib>" tags to add to Solr's classpath, which an attacker might use to load malicious code as a searchComponent or other plugin. This issue affects all Apache Solr versions up through Solr 9.7.  Users can protect against the vulnerability by enabling authentication and authorization on their Solr clusters or switching to SolrCloud (and away from "FileSystemConfigSetService").  Users are also recommended to upgrade to Solr 9.8.0, which mitigates t...

CVSS3: 5.5
nvd
11 месяцев назад

Core creation allows users to replace "trusted" configset files with arbitrary configuration Solr instances that (1) use the "FileSystemConfigSetService" component (the default in "standalone" or "user-managed" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual "trusted" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem.  These replacement config files are treated as "trusted" and can use "<lib>" tags to add to Solr's classpath, which an attacker might use to load malicious code as a searchComponent or other plugin. This issue affects all Apache Solr versions up through Solr 9.7.  Users can protect against the vulnerability by enabling authentication and authorization on their Solr clusters or switching to SolrCloud (and away from "FileSystemConfigSetService").  Users are also recommended to upgrade to Solr 9.8.0, which mitigates th

CVSS3: 5.5
debian
11 месяцев назад

Core creation allows users to replace "trusted" configset files with a ...

github
11 месяцев назад

Apache Solr vulnerable to Execution with Unnecessary Privileges

CVSS3: 4.6
fstec
11 месяцев назад

Уязвимость компонента "FileSystemConfigSetService" поискового сервера Apache Solr, позволяющая нарушителю загрузить вредоносный код

4.6 Medium

CVSS3