First published: Fri Feb 09 2024(Updated: )
Apache Solr could allow a remote attacker to obtain sensitive information, caused by an exposure of sensitive information to an unauthorized actor vulnerability. By using Streaming Expressions, an attacker could exploit his vulnerability to extract data from other Solr Clouds using a zkHost parameter and expose ZooKeeper credentials.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Solr | >=6.0.0<8.11.3 | |
Apache Solr | >=9.0.0<9.4.1 | |
maven/org.apache.solr:solr-solrj | >=6.0.0<8.11.3 | 8.11.3 |
maven/org.apache.solr:solr-solrj | >=9.0.0<9.4.1 | 9.4.1 |
maven/org.apache.solr:solr-solrj-streaming | >=6.0.0<8.11.3 | 8.11.3 |
maven/org.apache.solr:solr-solrj-streaming | >=9.0.0<9.4.1 | 9.4.1 |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.