Exposure of Sensitive Information to an Unauthorized Actor Affecting org.apache.solr:solr-core package, versions [6.0.0,8.11.3)[9.0.0,9.4.1)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.09% (40th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JAVA-ORGAPACHESOLR-6241852
  • published12 Feb 2024
  • disclosed9 Feb 2024
  • creditQing Xu

Introduced: 9 Feb 2024

CVE-2023-50298  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade org.apache.solr:solr-core to version 8.11.3, 9.4.1 or higher.

Overview

org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene

Affected versions of this package are vulnerable to Exposure of Sensitive Information to an Unauthorized Actor due to the use of a zkHost parameter that allows users to extract data from other Solr Clouds. When the original SolrCloud is configured to use ZooKeeper credentials and ACLs, these credentials are sent to any zkHost specified by the user. An attacker could exploit this by setting up a mock ZooKeeper server that accepts ZooKeeper requests with credentials and ACLs to extract sensitive information. Streaming Expressions are exposed via the "/streaming" handler, with "read" permissions.

CVSS Scores

version 3.1