CVE-2018-11802
- EPSS 0.15%
- Published 01.04.2020 22:15:15
- Last modified 21.11.2024 03:44:03
In Apache Solr, the cluster can be partitioned into multiple collections and only a subset of nodes actually host any given collection. However, if a node receives a request for a collection it does not host, it proxies the request to a relevant node...
CVE-2019-17558
- EPSS 94.47%
- Published 30.12.2019 17:15:19
- Last modified 07.03.2025 14:24:42
Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined...
CVE-2019-12409
- EPSS 82.77%
- Published 18.11.2019 21:15:11
- Last modified 21.11.2024 04:22:46
The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected rele...
CVE-2019-12401
- EPSS 28.2%
- Published 10.09.2019 15:15:11
- Last modified 21.11.2024 04:22:45
Solr versions 1.3.0 to 1.4.1, 3.1.0 to 3.6.2 and 4.0.0 to 4.10.4 are vulnerable to an XML resource consumption attack (a.k.a. Lol Bomb) via it’s update handler.?By leveraging XML DOCTYPE and ENTITY type elements, the attacker can create a pattern tha...
- EPSS 93.13%
- Published 01.08.2019 14:15:13
- Last modified 21.03.2025 21:08:22
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH adm...
CVE-2017-3164
- EPSS 55.85%
- Published 08.03.2019 21:29:00
- Last modified 21.11.2024 03:24:57
Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to...
CVE-2019-0192
- EPSS 93.19%
- Published 07.03.2019 21:29:00
- Last modified 21.11.2024 04:16:27
In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trig...
CVE-2018-8026
- EPSS 4.34%
- Published 05.07.2018 14:29:00
- Last modified 21.11.2024 04:13:07
This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude ...
CVE-2018-8010
- EPSS 1.58%
- Published 21.05.2018 19:29:00
- Last modified 21.11.2024 04:13:05
This vulnerability in Apache Solr 6.0.0 to 6.6.3, 7.0.0 to 7.3.0 relates to an XML external entity expansion (XXE) in Solr config files (solrconfig.xml, schema.xml, managed-schema). In addition, Xinclude functionality provided in these config files i...
CVE-2018-1308
- EPSS 6.07%
- Published 09.04.2018 13:29:00
- Last modified 21.11.2024 03:59:35
This vulnerability in Apache Solr 1.2 to 6.6.2 and 7.0.0 to 7.2.1 relates to an XML external entity expansion (XXE) in the `&dataConfig=<inlinexml>` parameter of Solr's DataImportHandler. It can be used as XXE using file/ftp/http protocols in order t...