First published: Fri Feb 09 2024(Updated: )
Apache Solr could allow a remote attacker to upload arbitrary files, caused by the improper control of dynamically-managed code resources. By using Backup/Restore APIs, a remote attacker could exploit this vulnerability to upload a malicious file, which could allow the attacker to execute arbitrary code on the vulnerable system.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.solr:solr-core | >=9.0.0<9.4.1 | 9.4.1 |
maven/org.apache.solr:solr-core | >=6.0.0<8.11.3 | 8.11.3 |
Apache Solr | >=6.0.0<8.11.3 | |
Apache Solr | >=9.0.0<9.4.1 | |
IBM Cognos Analytics | <=12.0.0-12.0.3 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP4 | |
>=6.0.0<8.11.3 | ||
>=9.0.0<9.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-50386 is a critical vulnerability that allows for unauthenticated file uploads in Apache Solr.
To remediate CVE-2023-50386, upgrade to Apache Solr version 9.4.1 or 8.11.3.
CVE-2023-50386 affects Apache Solr versions from 6.0.0 up to but not including 9.4.1 and 8.11.3.
Exploitation of CVE-2023-50386 could allow a remote attacker to upload arbitrary files, potentially leading to arbitrary code execution.
CVE-2023-50386 was publicly disclosed on October 4, 2023.