|
Message-ID: <818be5cf-b661-f1a1-2e33-98e8a330fa4f@apache.org> Date: Sun, 26 Jan 2025 11:58:22 +0000 From: Jason Gerlowski <gerlowskija@...che.org> To: oss-security@...ts.openwall.com Subject: CVE-2024-52012: Apache Solr: Configset upload on Windows allows arbitrary path write-access Severity: moderate Affected versions: - Apache Solr 6.6 through 9.7.0 Description: Relative Path Traversal vulnerability in Apache Solr. Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the "configset upload" API. Commonly known as a "zipslip", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem. This issue affects Apache Solr: from 6.6 through 9.7.0. Users are recommended to upgrade to version 9.8.0, which fixes the issue. Users unable to upgrade may also safely prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users. This issue is being tracked as SOLR-17543 Credit: rry (finder) References: https://solr.apache.org https://www.cve.org/CVERecord?id=CVE-2024-52012 https://issues.apache.org/jira/browse/SOLR-17543
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.