CVE-2020-13957
- EPSS 84.69%
- Veröffentlicht 13.10.2020 19:15:12
- Zuletzt bearbeitet 21.11.2024 05:02:14
Apache Solr versions 6.6.0 to 6.6.6, 7.0.0 to 7.7.3 and 8.0.0 to 8.6.2 prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that's uploaded via API without authentication/authoriz...
CVE-2020-13941
- EPSS 2.8%
- Veröffentlicht 17.08.2020 13:15:12
- Zuletzt bearbeitet 21.11.2024 05:02:11
Reported in SOLR-14515 (private) and fixed in SOLR-14561 (public), released in Solr version 8.6.0. The Replication handler (https://lucene.apache.org/solr/guide/8_6/index-replication.html#http-api-commands-for-the-replicationhandler) allows commands ...
CVE-2018-11802
- EPSS 0.15%
- Veröffentlicht 01.04.2020 22:15:15
- Zuletzt bearbeitet 28.11.2025 17:01:41
In Apache Solr, the cluster can be partitioned into multiple collections and only a subset of nodes actually host any given collection. However, if a node receives a request for a collection it does not host, it proxies the request to a relevant node...
CVE-2019-17558
- EPSS 94.47%
- Veröffentlicht 30.12.2019 17:15:19
- Zuletzt bearbeitet 27.10.2025 17:37:34
Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined...
CVE-2019-12409
- EPSS 82.77%
- Veröffentlicht 18.11.2019 21:15:11
- Zuletzt bearbeitet 21.11.2024 04:22:46
The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected rele...
CVE-2019-12401
- EPSS 28.2%
- Veröffentlicht 10.09.2019 15:15:11
- Zuletzt bearbeitet 21.11.2024 04:22:45
Solr versions 1.3.0 to 1.4.1, 3.1.0 to 3.6.2 and 4.0.0 to 4.10.4 are vulnerable to an XML resource consumption attack (a.k.a. Lol Bomb) via it’s update handler.?By leveraging XML DOCTYPE and ENTITY type elements, the attacker can create a pattern tha...
- EPSS 93.2%
- Veröffentlicht 01.08.2019 14:15:13
- Zuletzt bearbeitet 27.10.2025 17:37:56
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH adm...
CVE-2017-3164
- EPSS 53.7%
- Veröffentlicht 08.03.2019 21:29:00
- Zuletzt bearbeitet 21.11.2024 03:24:57
Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to...
CVE-2019-0192
- EPSS 93.6%
- Veröffentlicht 07.03.2019 21:29:00
- Zuletzt bearbeitet 21.11.2024 04:16:27
In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trig...
CVE-2018-8026
- EPSS 4.34%
- Veröffentlicht 05.07.2018 14:29:00
- Zuletzt bearbeitet 21.11.2024 04:13:07
This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude ...