First published: Thu Oct 12 2017(Updated: )
It was found that Apache Solr would accept an object from an unauthenticated user that could be manipulated through subsequent post requests. An attacker could use this flaw to assemble an object that could permit execution of arbitrary code on the server.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/lucene-solr | 3.6.2+dfsg-20+deb10u2 3.6.2+dfsg-24 3.6.2+dfsg-26 | |
redhat/lucene-solr | <5.5.5 | 5.5.5 |
redhat/lucene-solr | <6.6.2 | 6.6.2 |
redhat/lucene-solr | <7.1 | 7.1 |
redhat/lucene-solr | <8.0 | 8.0 |
maven/org.apache.solr:solr-core | >=5.5.0<5.5.5 | 5.5.5 |
maven/org.apache.solr:solr-core | >=6.0.0<6.6.2 | 6.6.2 |
maven/org.apache.solr:solr-core | >=7.0.0<7.1.0 | 7.1.0 |
ubuntu/lucene-solr | <3.6.2+dfsg-10+ | 3.6.2+dfsg-10+ |
ubuntu/lucene-solr | <3.6.2+dfsg-2ubuntu0.1~ | 3.6.2+dfsg-2ubuntu0.1~ |
ubuntu/lucene-solr | <3.6.2+dfsg-8ubuntu0.1 | 3.6.2+dfsg-8ubuntu0.1 |
Apache Solr | >=5.5.0<=5.5.4 | |
Apache Solr | >=6.0.0<=6.6.1 | |
Apache Solr | >=7.0.0<=7.0.1 | |
All of | ||
Any of | ||
JBoss Enterprise Application Platform | =7.0.0 | |
JBoss Enterprise Application Platform | =7.1.0 | |
Any of | ||
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 | |
Debian Linux | =7.0 | |
Debian Linux | =8.0 | |
Debian Linux | =9.0 | |
Ubuntu | =16.04 | |
JBoss Enterprise Application Platform | =7.0.0 | |
JBoss Enterprise Application Platform | =7.1.0 | |
Red Hat Enterprise Linux Server | =6.0 | |
Red Hat Enterprise Linux Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12629 has been classified as a critical security vulnerability due to its ability to allow remote code execution.
To remediate CVE-2017-12629, upgrade to the patched versions of Apache Solr as specified in the vulnerability details.
CVE-2017-12629 affects several versions of Apache Solr, including multiple releases of Lucene-Solr across Debian, Red Hat, and Ubuntu distributions.
An attacker exploiting CVE-2017-12629 can manipulate objects sent by unauthenticated users, potentially leading to arbitrary code execution on the server.
Yes, CVE-2017-12629 has been publicly disclosed, which makes it imperative for users to address the vulnerability without delay.