First published: Tue Apr 13 2021(Updated: )
The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Solr | <8.8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-27905 is critical with a CVSS score of 9.8.
The affected software for CVE-2021-27905 is Apache Solr versions up to exclusive 8.8.2.
An SSRF vulnerability refers to Server-Side Request Forgery, which allows an attacker to make requests to internal or external resources on behalf of a vulnerable server.
The ReplicationHandler in Apache Solr, particularly the "masterUrl" parameter, is used in the SSRF attack vector for CVE-2021-27905, allowing replication of index data from another Solr core.
Yes, upgrading to Apache Solr version 8.8.2 or later will address the vulnerability of CVE-2021-27905.