Information Exposure Affecting org.apache.solr:solr-core package, versions [,8.8.2)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHESOLR-1245073
- published 13 Apr 2021
- disclosed 13 Apr 2021
- credit Timothy Potter, Mike Drob, Apple Cloud Services
Introduced: 13 Apr 2021
CVE-2021-29262 Open this link in a new tabHow to fix?
Upgrade org.apache.solr:solr-core
to version 8.8.2 or higher.
Overview
org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene
Affected versions of this package are vulnerable to Information Exposure. When starting Solr
, configured with the SaslZkACLProvider
or VMParamsAllAndReadonlyDigestZkACLProvider
and no existing security.json
znode, if the optional read-only user is configured then Solr
would not treat that node as a sensitive path and would allow it to be readable. Additionally, with any ZkACLProvider
, if the security.json
is already present, Solr
will not automatically update the ACLs.