First published: Fri Feb 09 2024(Updated: )
Apache Solr could allow a remote attacker to obtain sensitive information, caused by an exposure of sensitive information to an unauthorized actor vulnerability. By using Streaming Expressions, an attacker could exploit his vulnerability to extract data from other Solr Clouds using a zkHost parameter and expose ZooKeeper credentials.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.solr:solr-solrj | >=6.0.0<8.11.3 | 8.11.3 |
maven/org.apache.solr:solr-solrj | >=9.0.0<9.4.1 | 9.4.1 |
maven/org.apache.solr:solr-solrj-streaming | >=6.0.0<8.11.3 | 8.11.3 |
maven/org.apache.solr:solr-solrj-streaming | >=9.0.0<9.4.1 | 9.4.1 |
Apache Solr | >=6.0.0<8.11.3 | |
Apache Solr | >=9.0.0<9.4.1 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 | |
>=6.0.0<8.11.3 | ||
>=9.0.0<9.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50298 has a high severity level due to the potential exposure of sensitive data.
To remedy CVE-2023-50298, upgrade Apache Solr to version 8.11.3 or 9.4.1.
CVE-2023-50298 affects Apache Solr versions between 6.0.0 and 8.11.3 and 9.0.0 to 9.4.1.
Yes, CVE-2023-50298 enables attackers to extract data from other Solr Clouds through Streaming Expressions.
Yes, CVE-2023-50298 can expose Zookeeper credentials, leading to unauthorized access to sensitive information.