Relative Path Traversal vulnerability in Apache Solr.
Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the "configset upload" API. Commonly known as a "zipslip", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.
This issue affects Apache Solr: from 6.6 through 9.7.0.
Users are recommended to upgrade to version 9.8.0, which fixes the issue. Users unable to upgrade may also safely prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.
Metrics
Affected Vendors & Products
References
History
Thu, 06 Feb 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Mon, 27 Jan 2025 09:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 27 Jan 2025 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Relative Path Traversal vulnerability in Apache Solr. Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the "configset upload" API. Commonly known as a "zipslip", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem. This issue affects Apache Solr: from 6.6 through 9.7.0. Users are recommended to upgrade to version 9.8.0, which fixes the issue. Users unable to upgrade may also safely prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users. | |
Title | Apache Solr: Configset upload on Windows allows arbitrary path write-access | |
Weaknesses | CWE-23 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-02-06T16:11:37.353Z
Reserved: 2024-11-04T19:07:57.861Z
Link: CVE-2024-52012

Updated: 2025-01-27T09:03:17.022Z

Status : Awaiting Analysis
Published: 2025-01-27T09:15:14.693
Modified: 2025-02-06T17:15:19.480
Link: CVE-2024-52012

No data.