Insecure Default Initialization of Resource Affecting org.apache.solr:solr-core package, versions [6.6.0, 8.11.4) [9.0.0, 9.7.0)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHESOLR-8220292
- published 16 Oct 2024
- disclosed 16 Oct 2024
- credit Liu Huajin
Introduced: 16 Oct 2024
CVE-2024-45217 Open this link in a new tabHow to fix?
Upgrade org.apache.solr:solr-core
to version 8.11.4, 9.7.0 or higher.
Overview
org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene
Affected versions of this package are vulnerable to Insecure Default Initialization of Resource via the Restore
command which copies a configSet
from the backup and assigns it a new name without setting the trusted
metadata. An attacker can execute arbitrary code by exploiting the implicit trust granted to these ConfigSets
if the trusted
flag is missing.
This is only exploitable if the Solr instance is not secured via Authentication/Authorization.