First published: Tue Oct 15 2024(Updated: )
Apache Solr could allow a remote attacker to bypass security restrictions, caused by improper authentication validation when using PKIAuthenticationPlugin. By sending a specially crafted request using a fake URL Path ending, an attacker could exploit this vulnerability to bypass access restriction.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.solr:solr | >=9.0.0<9.7.0 | 9.7.0 |
maven/org.apache.solr:solr | >=5.3.0<8.11.4 | 8.11.4 |
IBM Cognos Analytics | <=12.0.0-12.0.4 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45216 is considered a critical vulnerability due to its potential for authentication bypass.
To remediate CVE-2024-45216, upgrade Apache Solr to version 9.7.0 or 8.11.4 if you are using affected versions.
Versions of Apache Solr between 5.3.0 and 9.6.x are affected by CVE-2024-45216 if using the PKIAuthenticationPlugin.
CVE-2024-45216 is caused by improper authentication which allows attackers to bypass authentication using a fake URL path.
Yes, CVE-2024-45216 specifically affects the PKIAuthenticationPlugin which is enabled by default in Solr.