Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add security notices for two recent CVEs #141

Merged
merged 1 commit into from
Jan 26, 2025
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Add security notices for two recent CVEs
  • Loading branch information
gerlowskija committed Jan 26, 2025
commit 45afa76d7b97e5b89312ee7b902a14ce22e57022
28 changes: 28 additions & 0 deletions content/solr/security/2025-01-26-cve-2024-52012.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
Title: CVE-2024-52012: Apache Solr: Configset upload on Windows allows arbitrary path write-access
category: solr/security
cve: CVE-2024-52012

**Severity**
moderate

**Versions Affected**

- Apache Solr 6.6 through 9.7.0

**Description**

Relative Path Traversal vulnerability in Apache Solr.

Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the "configset upload" API. Commonly known as a "zipslip", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.
This issue affects Apache Solr: from 6.6 through 9.7.0.

**Mitigation**

Users are recommended to upgrade to version 9.8.0, which fixes the issue. Users unable to upgrade may also safely prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.

**Credit**
rry (reporter)

**References**
JIRA - [SOLR-17543](https://issues.apache.org/jira/browse/SOLR-17543)
CVE - [CVE-2024-52012](https://www.cve.org/CVERecord?id=CVE-2024-52012)
29 changes: 29 additions & 0 deletions content/solr/security/2025-01-26-cve-2025-24814.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
Title: CVE-2025-24814: Apache Solr: Core-creation with "trusted" configset can use arbitrary untrusted files
category: solr/security
cve: CVE-2025-24814

**Severity**
moderate

**Versions Affected**

- Apache Solr through 9.7

**Description**

Core creation allows users to replace "trusted" configset files with arbitrary configuration

Solr instances that (1) use the "FileSystemConfigSetService" component (the default in "standalone" or "user-managed" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual "trusted" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem. These replacement config files are treated as "trusted" and can use "<lib>" tags to add to Solr's classpath, which an attacker might use to load malicious code as a searchComponent or other plugin.

This issue affects all Apache Solr versions up through Solr 9.7.

**Mitigation**

Users can protect against the vulnerability by enabling authentication and authorization on their Solr clusters or switching to SolrCloud (and away from "FileSystemConfigSetService"). Users are also recommended to upgrade to Solr 9.8.0, which mitigates this issue by disabling use of "<lib>" tags by default.

**Credit**
pwn null (reporter)

**References**
JIRA - [SOLR-16781](https://issues.apache.org/jira/browse/SOLR-16781)
CVE - [CVE-2025-24814](https://www.cve.org/CVERecord?id=CVE-2025-24814)
Loading