![Advisory Published](https://public.secalerts.co/assets/images/icon-advisory-published.svg)
26/1/2025
![CVE Published](https://public.secalerts.co/assets/images/icon-cve-published.svg)
27/1/2025
![Advisory Published](https://public.secalerts.co/assets/images/icon-advisory-published.svg)
27/1/2025
![Updated](https://public.secalerts.co/assets/images/icon-updated.svg)
6/2/2025
CVE-2024-52012: Apache Solr: Configset upload on Windows allows arbitrary path write-access
First published: Sun Jan 26 2025(Updated: )
Relative Path Traversal vulnerability in Apache Solr.
Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the "configset upload" API. Commonly known as a "zipslip", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.
This issue affects Apache Solr: from 6.6 through 9.7.0.
Users are recommended to upgrade to version 9.8.0, which fixes the issue. Users unable to upgrade may also safely prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|
Apache Solr | >=6.6<9.7.0 | |
maven/org.apache.solr:solr-core | >=6.6<9.8.0 | 9.8.0 |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2024-52012?
CVE-2024-52012 is considered a high severity vulnerability due to its potential for arbitrary file writes.
How do I fix CVE-2024-52012?
To fix CVE-2024-52012, upgrade Apache Solr to version 9.8.0 or later.
Which versions of Apache Solr are affected by CVE-2024-52012?
CVE-2024-52012 affects Apache Solr versions from 6.6.0 up to 9.7.0.
What kind of vulnerability is CVE-2024-52012?
CVE-2024-52012 is a relative path traversal vulnerability caused by improper input sanitation.
What can attackers achieve through CVE-2024-52012?
Attackers can exploit CVE-2024-52012 to write arbitrary files on the server running vulnerable Solr instances.
- collector/oss-sec
- source/oss-sec
- alias/CVE-2024-52012
- agent/title
- agent/first-publish-date
- agent/weakness
- agent/description
- agent/type
- agent/guess-ai
- agent/software-canonical-lookup
- collector/github-advisory-latest
- source/GitHub
- alias/GHSA-4p5m-gvpf-f3x5
- agent/references
- agent/source
- agent/softwarecombine
- agent/trending
- collector/nvd-cve
- source/NVD
- agent/author
- collector/github-advisory
- agent/tags
- collector/mitre-cve
- source/MITRE
- collector/nvd-api
- agent/last-modified-date
- agent/severity
- agent/event
- vendor/apache
- canonical/apache solr
- package-manager/maven
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203