10.0.0
17 years ago
1 months ago
Known vulnerabilities in the org.apache.solr:solr-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene Affected versions of this package are vulnerable to Files or Directories Accessible to External Parties in the This is only exploitable if Solr is running in standalone mode and the How to fix Files or Directories Accessible to External Parties? Upgrade | [8.6.0,9.10.1) |
org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene Affected versions of this package are vulnerable to Missing Authorization in the Rule Based Authorization Plugin, by which the
How to fix Missing Authorization? Upgrade | [5.3.0,9.10.1) |
org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene Affected versions of this package are vulnerable to Execution with Unnecessary Privileges due to the potential for attackers to control what configset is loaded by the How to fix Execution with Unnecessary Privileges? Upgrade | [,9.8.0) |
org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene Affected versions of this package are vulnerable to Arbitrary File Write via Archive Extraction (Zip Slip) in the Note: This vulnerability is only exploitable on Windows systems. How to fix Arbitrary File Write via Archive Extraction (Zip Slip)? Upgrade | [6.6,9.8.0) |
org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene Affected versions of this package are vulnerable to Improper Authentication due to insecure code in An attacker can bypass the authentication process by appending a fake ending to the URL path, which appears to be an unprotected API path but is internally stripped off after authentication and before API routing. Note: Solr instances using the How to fix Improper Authentication? Upgrade | [5.3.0,8.11.4)[9.0.0,9.7.0) |
org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene Affected versions of this package are vulnerable to Insecure Default Initialization of Resource via the This is only exploitable if the Solr instance is not secured via Authentication/Authorization. How to fix Insecure Default Initialization of Resource? Upgrade | [6.6.0,8.11.4)[9.0.0,9.7.0) |
org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene Affected versions of this package are vulnerable to Exposure of Sensitive Information to an Unauthorized Actor due to the use of a How to fix Exposure of Sensitive Information to an Unauthorized Actor? Upgrade | [6.0.0,8.11.3)[9.0.0,9.4.1) |
org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene Affected versions of this package are vulnerable to Incorrect Permission Assignment for Critical Resource due to the Schema Designer not properly authenticating How to fix Incorrect Permission Assignment for Critical Resource? Upgrade | [8.10.0,8.11.3)[9.0.0,9.3.0) |
org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene Affected versions of this package are vulnerable to Unrestricted Upload of File with Dangerous Type due to the Note: This vulnerability is most severe when Authorization is not enabled, which is strongly recommended against. With Authorization enabled it is limited to extending the Backup permissions with the ability to add libraries. How to fix Unrestricted Upload of File with Dangerous Type? Upgrade | [6.0.0,8.11.3)[9.0.0,9.4.1) |
org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene Affected versions of this package are vulnerable to Insufficiently Protected Credentials due to system property redaction logic inconsistencies. An attacker can access sensitive information, such as credentials for basic authentication or AWS secret keys, by exploiting the How to fix Insufficiently Protected Credentials? Upgrade | [6.0.0,8.11.3)[9.0.0,9.3.0) |