Relative Path Traversal vulnerability in Apache Solr. Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the "configset upload" API.  Commonly known as a "zipslip", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.   This issue affects Apache Solr: from 6.6 through 9.7.0. Users are recommended to upgrade to version 9.8.0, which fixes the issue.  Users unable to upgrade may also safely prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.
History

Thu, 06 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 27 Jan 2025 09:45:00 +0000

Type Values Removed Values Added
References

Mon, 27 Jan 2025 09:00:00 +0000

Type Values Removed Values Added
Description Relative Path Traversal vulnerability in Apache Solr. Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the "configset upload" API.  Commonly known as a "zipslip", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.   This issue affects Apache Solr: from 6.6 through 9.7.0. Users are recommended to upgrade to version 9.8.0, which fixes the issue.  Users unable to upgrade may also safely prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.
Title Apache Solr: Configset upload on Windows allows arbitrary path write-access
Weaknesses CWE-23
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-02-06T16:11:37.353Z

Reserved: 2024-11-04T19:07:57.861Z

Link: CVE-2024-52012

cve-icon Vulnrichment

Updated: 2025-01-27T09:03:17.022Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-01-27T09:15:14.693

Modified: 2025-02-06T17:15:19.480

Link: CVE-2024-52012

cve-icon Redhat

No data.