Apache

Solr

44 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.15%
  • Veröffentlicht 01.04.2020 22:15:15
  • Zuletzt bearbeitet 21.11.2024 03:44:03

In Apache Solr, the cluster can be partitioned into multiple collections and only a subset of nodes actually host any given collection. However, if a node receives a request for a collection it does not host, it proxies the request to a relevant node...

Warnung Exploit
  • EPSS 94.47%
  • Veröffentlicht 30.12.2019 17:15:19
  • Zuletzt bearbeitet 07.03.2025 14:24:42

Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined...

Exploit
  • EPSS 82.77%
  • Veröffentlicht 18.11.2019 21:15:11
  • Zuletzt bearbeitet 21.11.2024 04:22:46

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected rele...

Exploit
  • EPSS 28.2%
  • Veröffentlicht 10.09.2019 15:15:11
  • Zuletzt bearbeitet 21.11.2024 04:22:45

Solr versions 1.3.0 to 1.4.1, 3.1.0 to 3.6.2 and 4.0.0 to 4.10.4 are vulnerable to an XML resource consumption attack (a.k.a. Lol Bomb) via it’s update handler.?By leveraging XML DOCTYPE and ENTITY type elements, the attacker can create a pattern tha...

Warnung
  • EPSS 93.13%
  • Veröffentlicht 01.08.2019 14:15:13
  • Zuletzt bearbeitet 21.03.2025 21:08:22

In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH adm...

  • EPSS 55.85%
  • Veröffentlicht 08.03.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:24:57

Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to...

  • EPSS 93.19%
  • Veröffentlicht 07.03.2019 21:29:00
  • Zuletzt bearbeitet 21.11.2024 04:16:27

In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trig...

Exploit
  • EPSS 4.34%
  • Veröffentlicht 05.07.2018 14:29:00
  • Zuletzt bearbeitet 21.11.2024 04:13:07

This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude ...

  • EPSS 1.58%
  • Veröffentlicht 21.05.2018 19:29:00
  • Zuletzt bearbeitet 21.11.2024 04:13:05

This vulnerability in Apache Solr 6.0.0 to 6.6.3, 7.0.0 to 7.3.0 relates to an XML external entity expansion (XXE) in Solr config files (solrconfig.xml, schema.xml, managed-schema). In addition, Xinclude functionality provided in these config files i...

  • EPSS 6.07%
  • Veröffentlicht 09.04.2018 13:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:35

This vulnerability in Apache Solr 1.2 to 6.6.2 and 7.0.0 to 7.2.1 relates to an XML external entity expansion (XXE) in the `&dataConfig=<inlinexml>` parameter of Solr's DataImportHandler. It can be used as XXE using file/ftp/http protocols in order t...