First published: Tue Oct 15 2024(Updated: )
Apache Solr could allow a remote authenticated attacker to bypass security restrictions, caused by an insecure default initialization of resource flaw. By sending a specially crafted request, an attacker could exploit this vulnerability to load custom code into classloaders.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.solr:solr | >=9.0.0<9.7.0 | 9.7.0 |
maven/org.apache.solr:solr | >=6.6.0<8.11.4 | 8.11.4 |
IBM Cognos Analytics | <=12.0.0-12.0.4 | |
IBM Cognos Analytics | <=11.2.0-11.2.4 FP5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-45217 is a critical vulnerability that allows remote authenticated attackers to bypass security restrictions in Apache Solr.
To fix CVE-2024-45217, upgrade to Apache Solr version 9.7.0 or 8.11.4, or apply the appropriate security patches for IBM Cognos Analytics.
The potential risks include unauthorized access to sensitive data and the ability for attackers to execute custom code on the server.
CVE-2024-45217 affects Apache Solr versions from 6.6.0 up to 9.7.0 and specific versions of IBM Cognos Analytics.
Organizations using Apache Solr or IBM Cognos Analytics within the affected versions should prioritize addressing this vulnerability to protect their systems.