First published: Fri Feb 09 2024(Updated: )
Apache Solr could allow a remote authenticated attacker to obtain sensitive information, caused by system property redaction logic inconsistencies. By using the /admin/info/properties endpoint, an attacker could exploit his vulnerability to leak certain passwords.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.solr:solr-core | >=9.0.0<9.3.0 | 9.3.0 |
maven/org.apache.solr:solr-core | >=6.0.0<8.11.3 | 8.11.3 |
Apache Solr | >=6.0.0<8.11.3 | |
Apache Solr | >=9.0.0<9.3.0 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 | |
>=6.0.0<8.11.3 | ||
>=9.0.0<9.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50291 is considered a high severity vulnerability due to its potential to leak sensitive information.
To fix CVE-2023-50291, upgrade Apache Solr to version 9.3.0 or 8.11.3 to eliminate the vulnerability.
CVE-2023-50291 allows remote authenticated attackers to exploit the vulnerability to leak passwords via the /admin/info/properties endpoint.
CVE-2023-50291 affects Apache Solr versions between 9.0.0 and 9.3.0 and 6.0.0 and 8.11.3.
The vendor responsible for CVE-2023-50291 is Apache, which maintains the Solr project.