Information Exposure Affecting org.apache.solr:solr-core package, versions [,8.8.2)

  • Attack Complexity


Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id


  • published

    13 Apr 2021

  • disclosed

    13 Apr 2021

  • credit

    Timothy Potter, Mike Drob, Apple Cloud Services

How to fix?

Upgrade org.apache.solr:solr-core to version 8.8.2 or higher.


org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene

Affected versions of this package are vulnerable to Information Exposure. When starting Solr, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be readable. Additionally, with any ZkACLProvider, if the security.json is already present, Solr will not automatically update the ACLs.