First published: Tue Sep 10 2019(Updated: )
Solr versions 1.3.0 to 1.4.1, 3.1.0 to 3.6.2 and 4.0.0 to 4.10.4 are vulnerable to an XML resource consumption attack (a.k.a. Lol Bomb) via it’s update handler.?By leveraging XML DOCTYPE and ENTITY type elements, the attacker can create a pattern that will expand when the server parses the XML causing OOMs.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Solr | >=1.3.0<=1.4.1 | |
Apache Solr | >=3.1<=3.6.2 | |
Apache Solr | >=4.0.0<=4.10.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12401 is a vulnerability in Solr versions 1.3.0 to 1.4.1, 3.1.0 to 3.6.2, and 4.0.0 to 4.10.4 that allows an XML resource consumption attack (a.k.a. Lol Bomb) via its update handler.
Solr versions 1.3.0 to 1.4.1, 3.1.0 to 3.6.2, and 4.0.0 to 4.10.4 are affected by CVE-2019-12401.
CVE-2019-12401 has a severity rating of 7.5 (high).
The CVE-2019-12401 vulnerability can be exploited by leveraging XML DOCTYPE and ENTITY type elements to create a pattern that expands when the server parses the XML, causing resource consumption.
Yes, to fix CVE-2019-12401, it is recommended to upgrade Solr to a version that is not affected by the vulnerability.