First published: Mon Sep 18 2017(Updated: )
Apache Solr's Kerberos plugin can be configured to use delegation tokens, which allows an application to reuse the authentication of an end-user or another application. There are two issues with this functionality (when using SecurityAwareZkACLProvider type of ACL provider e.g. SaslZkACLProvider). Firstly, access to the security configuration can be leaked to users other than the solr super user. Secondly, malicious users can exploit this leaked configuration for privilege escalation to further expose/modify private data and/or disrupt operations in the Solr cluster. The vulnerability is fixed from Apache Solr 6.6.1 onwards.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Solr | =6.2.0 | |
Apache Solr | =6.2.1 | |
Apache Solr | =6.3.0 | |
Apache Solr | =6.4.0 | |
Apache Solr | =6.4.1 | |
Apache Solr | =6.4.2 | |
Apache Solr | =6.5.0 | |
Apache Solr | =6.5.1 | |
Apache Solr | =6.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-9803 is categorized as a high severity vulnerability due to its exploitability which could potentially lead to unauthorized access.
To fix CVE-2017-9803, upgrade Apache Solr to the latest version that has addressed this vulnerability.
CVE-2017-9803 affects Apache Solr versions 6.2.0, 6.2.1, 6.3.0, 6.4.0, 6.4.1, 6.4.2, 6.5.0, 6.5.1, and 6.6.0.
CVE-2017-9803 could allow an attacker to reuse authentication tokens, potentially compromising the security of user sessions.
A workaround for CVE-2017-9803 is not recommended; the best practice is to update to a patched version of Apache Solr.