Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <818be5cf-b661-f1a1-2e33-98e8a330fa4f@apache.org>
Date: Sun, 26 Jan 2025 11:58:22 +0000
From: Jason Gerlowski <gerlowskija@...che.org>
To: oss-security@...ts.openwall.com
Subject: CVE-2024-52012: Apache Solr: Configset upload on Windows allows
 arbitrary path write-access 

Severity: moderate

Affected versions:

- Apache Solr 6.6 through 9.7.0

Description:

Relative Path Traversal vulnerability in Apache Solr.

Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the "configset upload" API.  Commonly known as a "zipslip", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.  
This issue affects Apache Solr: from 6.6 through 9.7.0.

Users are recommended to upgrade to version 9.8.0, which fixes the issue.  Users unable to upgrade may also safely prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.

This issue is being tracked as SOLR-17543 

Credit:

rry (finder)

References:

https://solr.apache.org
https://www.cve.org/CVERecord?id=CVE-2024-52012
https://issues.apache.org/jira/browse/SOLR-17543

Powered by blists - more mailing lists

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.