Remote Code Execution (RCE) Affecting org.apache.solr:solr-core package, versions [6.6.0, 8.6.3)
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
71.79% (99th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHESOLR-1017401
- published 14 Oct 2020
- disclosed 14 Oct 2020
- credit Tomás Fernández Löbbe, András Salamon
Introduced: 14 Oct 2020
CVE-2020-13957 Open this link in a new tabHow to fix?
Upgrade org.apache.solr:solr-core
to version 8.6.3 or higher.
Overview
org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene
Affected versions of this package are vulnerable to Remote Code Execution (RCE). Features considered dangerous (which could be used for remote code execution) can be configured in a ConfigSet
that's uploaded via API without authentication or authorization. The checks in place to prevent such features can be circumvented by using a combination of the UPLOAD
and CREATE
actions.
CVSS Scores
version 3.1