First published: Mon May 21 2018(Updated: )
This vulnerability in Apache Solr 6.0.0 to 6.6.3, 7.0.0 to 7.3.0 relates to an XML external entity expansion (XXE) in Solr config files (solrconfig.xml, schema.xml, managed-schema). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. Users are advised to upgrade to either Solr 6.6.4 or Solr 7.3.1 releases both of which address the vulnerability. Once upgrade is complete, no other steps are required. Those releases only allow external entities and Xincludes that refer to local files / zookeeper resources below the Solr instance directory (using Solr's ResourceLoader); usage of absolute URLs is denied. Keep in mind, that external entities and XInclude are explicitly supported to better structure config files in large installations. Before Solr 6 this was no problem, as config files were not accessible through the APIs.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Solr | >=6.0.0<=6.6.3 | |
Apache Solr | >=7.0.0<=7.3.0 | |
maven/org.apache.solr:solr-core | >=7.0.0<7.3.1 | 7.3.1 |
maven/org.apache.solr:solr-core | >=6.6.0<6.6.4 | 6.6.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-8010 is a vulnerability in Apache Solr versions 6.0.0 to 6.6.3 and 7.0.0 to 7.3.0 that relates to an XML external entity expansion (XXE) in Solr config files.
CVE-2018-8010 affects Apache Solr by allowing attackers to exploit XML external entity expansion vulnerability and Xinclude functionality in Solr config files.
CVE-2018-8010 has a severity rating of 5.5, which is considered medium.
To fix CVE-2018-8010, upgrade to a version of Apache Solr that is not affected by this vulnerability.
You can find more information about CVE-2018-8010 at the following references: [link1], [link2], [link3]