Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion') The advisory has been revoked - it doesn't affect any version of package lucene-solr  (opens in a new tab)


Threat Intelligence

EPSS
0.33% (72nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIANUNSTABLE-LUCENESOLR-466451
  • published10 Sept 2019
  • disclosed10 Sept 2019

Introduced: 10 Sep 2019

CVE-2019-12401  (opens in a new tab)
CWE-776  (opens in a new tab)

Amendment

The Debian security team deemed this advisory irrelevant for Debian:unstable.

NVD Description

Note: Versions mentioned in the description apply only to the upstream lucene-solr package and not the lucene-solr package as distributed by Debian.

Solr versions 1.3.0 to 1.4.1, 3.1.0 to 3.6.2 and 4.0.0 to 4.10.4 are vulnerable to an XML resource consumption attack (a.k.a. Lol Bomb) via it’s update handler.?By leveraging XML DOCTYPE and ENTITY type elements, the attacker can create a pattern that will expand when the server parses the XML causing OOMs.

References