This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated files can be uploaded as configsets using Solr's API, allowing to exploit that vulnerability.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/104690 | Third Party Advisory VDB Entry |
https://issues.apache.org/jira/browse/SOLR-12450 | Exploit Issue Tracking Vendor Advisory |
https://mail-archives.apache.org/mod_mbox/lucene-solr-user/201807.mbox/%3C0cdc01d413b7%24f97ba580%24ec72f080%24%40apache.org%3E | Mailing List Vendor Advisory |
https://security.netapp.com/advisory/ntap-20190307-0002/ | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-07-05 14:29
Updated : 2019-03-29 18:44
NVD link : CVE-2018-8026
Mitre link : CVE-2018-8026
CVE.ORG link : CVE-2018-8026
JSON object : View
Products Affected
apache
- solr
netapp
- storage_automation_store
- snapcenter
CWE
CWE-611
Improper Restriction of XML External Entity Reference