Server-Side Request Forgery (SSRF)

Affecting org.apache.solr:solr-core artifact, versions [,8.8.2)

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene

Affected versions of this package are vulnerable to Server-Side Request Forgery (SSRF). The ReplicationHandler (normally registered at /replication under a Solr core) has a masterUrl (also leaderUrl alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. These parameters are not checked against a similar configuration it uses for the shards parameter.

Remediation

Upgrade org.apache.solr:solr-core to version 8.8.2 or higher.

References

CVSS Score

7.2
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Changed
  • Confidentiality
    Low
  • Integrity
    Low
  • Availability
    None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C
Credit
Caolinhong (Skay)
CVE
CVE-2021-27905
CWE
CWE-918
Snyk ID
SNYK-JAVA-ORGAPACHESOLR-1245056
Disclosed
13 Apr, 2021
Published
13 Apr, 2021