First published: Thu Jul 05 2018(Updated: )
This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated files can be uploaded as configsets using Solr's API, allowing to exploit that vulnerability.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Solr | >6.0.0<=6.6.4 | |
Apache Solr | >=7.0.0<=7.3.1 | |
Netapp Snapcenter | ||
Netapp Storage Automation Store | ||
maven/org.apache.solr:solr-core | >=7.0.0<7.4.0 | 7.4.0 |
maven/org.apache.solr:solr-core | >=6.0.0<6.6.5 | 6.6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-8026 is medium with a CVSS score of 5.5.
The affected software for CVE-2018-8026 is Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1, as well as Netapp Snapcenter and Netapp Storage Automation Store.
CVE-2018-8026 is a vulnerability in Apache Solr that relates to an XML external entity expansion (XXE) in Solr config files, and it also affects Netapp Snapcenter and Netapp Storage Automation Store.
To fix CVE-2018-8026, you should upgrade to a fixed version of Apache Solr, such as 6.6.5 or 7.3.2, and ensure that XML external entity (XXE) processing is disabled.
You can find more information about CVE-2018-8026 on the following references: [http://www.securityfocus.com/bid/104690](http://www.securityfocus.com/bid/104690), [https://issues.apache.org/jira/browse/SOLR-12450](https://issues.apache.org/jira/browse/SOLR-12450), [https://mail-archives.apache.org/mod_mbox/lucene-solr-user/201807.mbox/%3C0cdc01d413b7%24f97ba580%24ec72f080%24%40apache.org%3E](https://mail-archives.apache.org/mod_mbox/lucene-solr-user/201807.mbox/%3C0cdc01d413b7%24f97ba580%24ec72f080%24%40apache.org%3E)