Improper Input Validation in Apache Solr
High severity
GitHub Reviewed
Published
Feb 12, 2020
to the GitHub Advisory Database
•
Updated Jul 25, 2024
Package
Affected versions
>= 5.0.0, <= 5.5.5
>= 6.0.0, <= 6.6.6
>= 7.0.0, <= 7.7.2
>= 8.0.0, <= 8.3.1
Patched versions
8.4.0
8.4.0
8.4.0
8.4.0
Description
Published by the National Vulnerability Database
Dec 30, 2019
Reviewed
Feb 11, 2020
Published to the GitHub Advisory Database
Feb 12, 2020
Last updated
Jul 25, 2024
Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset
velocity/
directory or as a parameter. A user defined configset could contain renderable, potentially malicious, templates. Parameter provided templates are disabled by default, but can be enabled by settingparams.resource.loader.enabled
by defining a response writer with that setting set totrue
. Defining a response writer requires configuration API access. Solr 8.4 removed the params resource loader entirely, and only enables the configset-provided template rendering when the configset istrusted
(has been uploaded by an authenticated user).References