Information Exposure Affecting org.apache.solr:solr-core package, versions [,8.8.2)


Severity

Recommended
0.0
low
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.59% (79th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGAPACHESOLR-1245073
  • published13 Apr 2021
  • disclosed13 Apr 2021
  • creditTimothy Potter, Mike Drob, Apple Cloud Services

Introduced: 13 Apr 2021

CVE-2021-29262  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade org.apache.solr:solr-core to version 8.8.2 or higher.

Overview

org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene

Affected versions of this package are vulnerable to Information Exposure. When starting Solr, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be readable. Additionally, with any ZkACLProvider, if the security.json is already present, Solr will not automatically update the ACLs.

CVSS Scores

version 3.1