QID 730613

Date Published: 2022-09-20

QID 730613: Apache Solr Information Disclosure Vulnerability

An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network.

Affected Versions:
Apache Solr prior to version 8.11.1

QID Detection Logic:
This QID sends a HTTP GET request to "solr/admin/info/system" endpoint and check for Apache Solr Version.

Note: This issue only affects Windows, hence the detection is kept as potential.

If the attacker has wider access to the network, this may lead to SMB attacks, which may result in the exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes). In case of misconfigured systems, SMB relay attacks can lead to user impersonation on SMB shares or, in a worse-case scenario, Remote Code Execution.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 6.8 severity.
  • Solution
    Customers are advised to upgrade to Apache Solr 8.11.1 or later version to remediate this vulnerability. For more information please refer to Apache Solr Security advisory

    CVEs related to QID 730613

    Software Advisories
    Advisory ID Software Component Link
    NA URL Logo solr.apache.org/security.html#cve-2021-44548-apache-solr-information-disclosure-vulnerability-through-dataimporthandler