QID 150553

Date Published: 2022-07-29

QID 150553: Apache Solr Improper Input Validation Vulnerability (CVE-2021-44548)

Apache Solr is an open-source enterprise search platform which is on Apache Lucene.

In affected versions of Apache Solr an Improper Input Validation vulnerability exists in DataImportHandler which allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks. This issue only affects Windows systems.

Affected Versions:
Apache Solr prior to version 8.11.1

QID Detection Logic:
This QID sends a HTTP GET request to "/admin/info/system" endpoint and based on the response determines vulnerable version of Apache Solr running on the target system.

Successful exploitation of this vulnerability could allow an attacker to exfiltrate sensitive data such as OS user hashes (NTLM/LM hashes) or in some misconfigured systems execute SMB Relay Attacks or Remote Code Execution.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Customers are advised to upgrade to Apache Solr 8.11.1 or later version to remediate this vulnerability. For more information please refer to Apache Solr Security advisory

    CVEs related to QID 150553

    Software Advisories
    Advisory ID Software Component Link
    Apache Solr Advisory URL Logo solr.apache.org/security.html#cve-2021-44548-apache-solr-information-disclosure-vulnerability-through-dataimporthandler