CVE-2019-17558 – org.apache.solr:solr-core
Package
Manager: maven
Name: org.apache.solr:solr-core
Vulnerable Version: >=5.0.0 <8.4.0 || >=6.0.0 <8.4.0 || >=7.0.0 <8.4.0 || >=8.0.0 <8.4.0
Severity
Level: High
CVSS v3.1: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
EPSS: 0.94474 pctl0.99998
Details
Improper Input Validation in Apache Solr Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined configset could contain renderable, potentially malicious, templates. Parameter provided templates are disabled by default, but can be enabled by setting `params.resource.loader.enabled` by defining a response writer with that setting set to `true`. Defining a response writer requires configuration API access. Solr 8.4 removed the params resource loader entirely, and only enables the configset-provided template rendering when the configset is `trusted` (has been uploaded by an authenticated user).
Metadata
Created: 2020-02-12T18:45:28Z
Modified: 2024-07-25T20:19:23Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/02/GHSA-ww97-9w65-2crx/GHSA-ww97-9w65-2crx.json
CWE IDs: ["CWE-20", "CWE-74", "CWE-94"]
Alternative ID: GHSA-ww97-9w65-2crx
Finding: F184
Auto approve: 1