First published: Fri Feb 09 2024(Updated: )
Apache Solr could allow a remote attacker to execute arbitrary code on the system, caused by the Schema Designer blindly trusting all configsets. An attacker could exploit his vulnerability to execute arbitrary code on the system.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.solr:solr-core | >=8.10.0<8.11.3 | 8.11.3 |
maven/org.apache.solr:solr-core | >=9.0.0<9.3.0 | 9.3.0 |
Apache Solr | >=6.0.0<8.11.3 | |
Apache Solr | >=9.0.0<9.4.1 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 | |
>=6.0.0<8.11.3 | ||
>=9.0.0<9.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50292 has been classified as critical due to the potential for remote code execution.
To mitigate CVE-2023-50292, upgrade Apache Solr to version 8.11.3 or 9.3.0 and apply any necessary patches.
CVE-2023-50292 affects Apache Solr versions from 6.0.0 up to 9.4.1, excluding 9.3.0.
CVE-2023-50292 allows remote attackers to execute arbitrary code on affected systems.
Yes, patches are available in the subsequent releases of Apache Solr versions 8.11.3 and 9.3.0.