cve-2024-52012
Vulnerability from cvelistv5
Published
2025-01-27 08:54
Modified
2025-02-06 16:11
Severity ?
EPSS score ?
Summary
Apache Solr: Configset upload on Windows allows arbitrary path write-access
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Apache Software Foundation | Apache Solr |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2025-01-27T09:03:17.022Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "http://www.openwall.com/lists/oss-security/2025/01/26/2" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-52012", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-27T13:34:11.686039Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-02-06T16:11:37.353Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Apache Solr", "vendor": "Apache Software Foundation", "versions": [ { "lessThanOrEqual": "9.7.0", "status": "affected", "version": "6.6", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "rry" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eRelative Path Traversal vulnerability in Apache Solr.\u003c/p\u003eSolr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the \"configset upload\" API.\u0026nbsp; Commonly known as a \"zipslip\", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.\u0026nbsp;\u0026nbsp;\u003cbr\u003e\u003cp\u003eThis issue affects Apache Solr: from 6.6 through 9.7.0.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 9.8.0, which fixes the issue.\u0026nbsp; Users unable to upgrade may also safely prevent the issue by using Solr\u0027s \"Rule-Based Authentication Plugin\" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.\u003c/p\u003e" } ], "value": "Relative Path Traversal vulnerability in Apache Solr.\n\nSolr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the \"configset upload\" API.\u00a0 Commonly known as a \"zipslip\", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.\u00a0\u00a0\nThis issue affects Apache Solr: from 6.6 through 9.7.0.\n\nUsers are recommended to upgrade to version 9.8.0, which fixes the issue.\u00a0 Users unable to upgrade may also safely prevent the issue by using Solr\u0027s \"Rule-Based Authentication Plugin\" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users." } ], "metrics": [ { "other": { "content": { "text": "moderate" }, "type": "Textual description of severity" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-23", "description": "CWE-23 Relative Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-27T08:54:42.907Z", "orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "shortName": "apache" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://lists.apache.org/thread/yp39pgbv4vf1746pf5yblz84lv30vfxd" } ], "source": { "defect": [ "SOLR-17543" ], "discovery": "EXTERNAL" }, "title": "Apache Solr: Configset upload on Windows allows arbitrary path write-access", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09", "assignerShortName": "apache", "cveId": "CVE-2024-52012", "datePublished": "2025-01-27T08:54:42.907Z", "dateReserved": "2024-11-04T19:07:57.861Z", "dateUpdated": "2025-02-06T16:11:37.353Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-52012\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2025-01-27T09:15:14.693\",\"lastModified\":\"2025-02-06T17:15:19.480\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Relative Path Traversal vulnerability in Apache Solr.\\n\\nSolr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the \\\"configset upload\\\" API.\u00a0 Commonly known as a \\\"zipslip\\\", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.\u00a0\u00a0\\nThis issue affects Apache Solr: from 6.6 through 9.7.0.\\n\\nUsers are recommended to upgrade to version 9.8.0, which fixes the issue.\u00a0 Users unable to upgrade may also safely prevent the issue by using Solr\u0027s \\\"Rule-Based Authentication Plugin\\\" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de Relative Path Traversal en Apache Solr. Las instancias de Solr que se ejecutan en Windows son vulnerables al acceso de escritura a rutas de archivo arbitrarias, debido a la falta de desinfecci\u00f3n de entrada en la API de \\\"carga de conjuntos de configuraci\u00f3n\\\". Los archivos ZIP creados de forma malintencionada, conocidos com\u00fanmente como \\\"zipslip\\\", pueden usar rutas de archivo relativas para escribir datos en partes no previstas del sistema de archivos. Este problema afecta a Apache Solr: desde la versi\u00f3n 6.6 hasta la 9.7.0. Se recomienda a los usuarios que actualicen a la versi\u00f3n 9.8.0, que soluciona el problema. Los usuarios que no puedan actualizar tambi\u00e9n pueden evitar el problema de forma segura utilizando el \\\"complemento de autenticaci\u00f3n basada en reglas\\\" de Solr para restringir el acceso a la API de carga de conjuntos de configuraci\u00f3n, de modo que solo pueda acceder a ella un conjunto confiable de administradores/usuarios.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-23\"}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/yp39pgbv4vf1746pf5yblz84lv30vfxd\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/01/26/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.