Improper Input Validation Affecting lucene-solr package, versions *


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

EPSS
0.32% (71st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN10-LUCENESOLR-608352
  • published24 Aug 2020
  • disclosed17 Aug 2020

Introduced: 17 Aug 2020

CVE-2020-13941  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

There is no fixed version for Debian:10 lucene-solr.

NVD Description

Note: Versions mentioned in the description apply only to the upstream lucene-solr package and not the lucene-solr package as distributed by Debian. See How to fix? for Debian:10 relevant fixed versions and status.

Reported in SOLR-14515 (private) and fixed in SOLR-14561 (public), released in Solr version 8.6.0. The Replication handler (https://lucene.apache.org/solr/guide/8_6/index-replication.html#http-api-commands-for-the-replicationhandler) allows commands backup, restore and deleteBackup. Each of these take a location parameter, which was not validated, i.e you could read/write to any location the solr user can access.

CVSS Scores

version 3.1