Apache Solr 配置集上传漏洞导致任意路径写入访问
oss-secmailing list archivesFrom: Jason Gerlowski <gerlowskija () apache org>D 2025-1-26 12:39:0 Author: seclists.org(查看原文) 阅读量:3 收藏

oss-sec logo

oss-sec mailing list archives


From: Jason Gerlowski <gerlowskija () apache org>
Date: Sun, 26 Jan 2025 11:58:22 +0000

Severity: moderate

Affected versions:

- Apache Solr 6.6 through 9.7.0

Description:

Relative Path Traversal vulnerability in Apache Solr.

Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation 
in the "configset upload" API.  Commonly known as a "zipslip", maliciously constructed ZIP files can use relative 
filepaths to write data to unanticipated parts of the filesystem.  
This issue affects Apache Solr: from 6.6 through 9.7.0.

Users are recommended to upgrade to version 9.8.0, which fixes the issue.  Users unable to upgrade may also safely 
prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so 
that it can only be accessed by a trusted set of administrators/users.

This issue is being tracked as SOLR-17543 

Credit:

rry (finder)

References:

https://solr.apache.org
https://www.cve.org/CVERecord?id=CVE-2024-52012
https://issues.apache.org/jira/browse/SOLR-17543


Current thread:

  • CVE-2024-52012: Apache Solr: Configset upload on Windows allows arbitrary path write-access Jason Gerlowski (Jan 26)

文章来源: https://seclists.org/oss-sec/2025/q1/78
如有侵权请联系:admin#unsafe.sh