Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CNVD-2017-33574
Vulnerability from cnvd - Published: 2017-11-10
VLAI Severity ?
Title
Apache Solr/Lucene远程代码执行漏洞
Description
Apache Solr 是一个开源的搜索服务器。Solr 使用 Java 语言开发,主要基于 HTTP 和 Apache Lucene 实现。Lucene是apache软件基金会4 jakarta项目组的一个子项目,是一个开放源代码的全文检索引擎工具包。
Apache Solr/Lucene存在远程代码执行漏洞。攻击者利用该漏洞可以获取敏感信息,或者在受影响应用程序上下文中执行任意代码漏洞 。
Severity
高
Formal description
厂商尚未提供漏洞修复方案,请关注厂商主页及时更新: http://www.apache.org/
Reference
http://www.securityfocus.com/bid/101261
http://openwall.com/lists/oss-security/2017/10/13/1
Impacted products
| Name | ['Apache Solr <7.1', 'Apache Lucene <7.1'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "101261"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2017-12629"
}
},
"description": "Apache Solr \u662f\u4e00\u4e2a\u5f00\u6e90\u7684\u641c\u7d22\u670d\u52a1\u5668\u3002Solr \u4f7f\u7528 Java \u8bed\u8a00\u5f00\u53d1\uff0c\u4e3b\u8981\u57fa\u4e8e HTTP \u548c Apache Lucene \u5b9e\u73b0\u3002Lucene\u662fapache\u8f6f\u4ef6\u57fa\u91d1\u4f1a4 jakarta\u9879\u76ee\u7ec4\u7684\u4e00\u4e2a\u5b50\u9879\u76ee\uff0c\u662f\u4e00\u4e2a\u5f00\u653e\u6e90\u4ee3\u7801\u7684\u5168\u6587\u68c0\u7d22\u5f15\u64ce\u5de5\u5177\u5305\u3002\r\n\r\nApache Solr/Lucene\u5b58\u5728\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u53ef\u4ee5\u83b7\u53d6\u654f\u611f\u4fe1\u606f\uff0c\u6216\u8005\u5728\u53d7\u5f71\u54cd\u5e94\u7528\u7a0b\u5e8f\u4e0a\u4e0b\u6587\u4e2d\u6267\u884c\u4efb\u610f\u4ee3\u7801\u6f0f\u6d1e \u3002",
"discovererName": "Michael Stepankin from JPMorgan Chase and Olga Barinova from Gotham Digital Science",
"formalWay": "\u5382\u5546\u5c1a\u672a\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u590d\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u53ca\u65f6\u66f4\u65b0\uff1a\r\nhttp://www.apache.org/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2017-33574",
"openTime": "2017-11-10",
"products": {
"product": [
"Apache Solr \u003c7.1",
"Apache Lucene \u003c7.1"
]
},
"referenceLink": "http://www.securityfocus.com/bid/101261\r\nhttp://openwall.com/lists/oss-security/2017/10/13/1",
"serverity": "\u9ad8",
"submitTime": "2017-10-16",
"title": "Apache Solr/Lucene\u8fdc\u7a0b\u4ee3\u7801\u6267\u884c\u6f0f\u6d1e"
}
CVE-2017-12629 (GCVE-0-2017-12629)
Vulnerability from cvelistv5 – Published: 2017-10-14 21:00 – Updated: 2024-08-05 18:43
VLAI?
EPSS
Summary
Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr.
Severity ?
No CVSS data available.
CWE
- Remote code execution
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| n/a | Apache Solr before 7.1 with Apache Lucene before 7.1 |
Affected:
Apache Solr before 7.1 with Apache Lucene before 7.1
Unaffected: lucene-solr 7.2.0 Unaffected: lucene-solr 8.0.0 Affected: lucene-solr , < 7.1.0 (custom) |
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T18:43:56.440Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2017:3451",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:3451"
},
{
"name": "[lucene-dev] 20171012 Re: Several critical vulnerabilities discovered in Apache Solr (XXE \u0026 RCE)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://s.apache.org/FJDl"
},
{
"name": "RHSA-2018:0002",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:0002"
},
{
"name": "101261",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/101261"
},
{
"name": "RHSA-2018:0004",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:0004"
},
{
"name": "RHSA-2017:3452",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:3452"
},
{
"name": "[debian-lts-announce] 20180121 [SECURITY] [DLA 1254-1] lucene-solr security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00028.html"
},
{
"name": "43009",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB",
"x_transferred"
],
"url": "https://www.exploit-db.com/exploits/43009/"
},
{
"name": "RHSA-2018:0003",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:0003"
},
{
"name": "RHSA-2017:3123",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:3123"
},
{
"name": "RHSA-2018:0005",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2018:0005"
},
{
"name": "RHSA-2017:3244",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:3244"
},
{
"name": "RHSA-2017:3124",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2017:3124"
},
{
"name": "[www-announce] 20171019 [SECURITY] CVE-2017-12629: Several critical vulnerabilities discovered in Apache Solr (XXE \u0026 RCE)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://mail-archives.us.apache.org/mod_mbox/www-announce/201710.mbox/%3CCAOOKt51UO_6Vy%3Dj8W%3Dx1pMbLW9VJfZyFWz7pAnXJC_OAdSZubA%40mail.gmail.com%3E"
},
{
"name": "DSA-4124",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2018/dsa-4124"
},
{
"name": "USN-4259-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4259-1/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://twitter.com/ApacheSolr/status/918731485611401216"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://twitter.com/searchtools_avi/status/918904813613543424"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://openwall.com/lists/oss-security/2017/10/13/1"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://twitter.com/joshbressers/status/919258716297420802"
},
{
"name": "[solr-users] 20210618 CVE-2021-27905 Apache Solr ReplicationHandler/SSRF vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef%40%3Cusers.solr.apache.org%3E"
},
{
"name": "[solr-users] 20210618 Re: CVE-2021-27905 Apache Solr ReplicationHandler/SSRF vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc%40%3Cusers.solr.apache.org%3E"
},
{
"name": "[solr-users] 20210728 Re: CVE-2021-27905 Apache Solr ReplicationHandler/SSRF vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314%40%3Cusers.solr.apache.org%3E"
},
{
"name": "[jackrabbit-oak-issues] 20210817 [jira] [Created] (OAK-9537) Security vulnerability in org/apache/lucene/queryparser/xml/CoreParser.java",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.apache.org/thread.html/r26c996b068ef6c5e89aa59acb769025cfd343a08e63fbe9e7f3f720f%40%3Coak-issues.jackrabbit.apache.org%3E"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Apache Solr before 7.1 with Apache Lucene before 7.1",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Apache Solr before 7.1 with Apache Lucene before 7.1"
},
{
"status": "unaffected",
"version": "lucene-solr 7.2.0"
},
{
"status": "unaffected",
"version": "lucene-solr 8.0.0"
},
{
"changes": [
{
"at": "6.6.2",
"status": "unaffected"
},
{
"at": "5.5.5",
"status": "unaffected"
}
],
"lessThan": "7.1.0",
"status": "affected",
"version": "lucene-solr",
"versionType": "custom"
}
]
},
{
"platforms": [
"redhat"
],
"product": "Apache Solr before 7.1 with Apache Lucene before 7.1",
"vendor": "n/a",
"versions": [
{
"lessThan": "5.3.1-redhat-2",
"status": "affected",
"version": "lucene-solr",
"versionType": "custom"
}
]
}
],
"datePublic": "2017-10-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Remote code execution",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-08-17T12:06:16",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"name": "RHSA-2017:3451",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:3451"
},
{
"name": "[lucene-dev] 20171012 Re: Several critical vulnerabilities discovered in Apache Solr (XXE \u0026 RCE)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://s.apache.org/FJDl"
},
{
"name": "RHSA-2018:0002",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:0002"
},
{
"name": "101261",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/101261"
},
{
"name": "RHSA-2018:0004",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:0004"
},
{
"name": "RHSA-2017:3452",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:3452"
},
{
"name": "[debian-lts-announce] 20180121 [SECURITY] [DLA 1254-1] lucene-solr security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00028.html"
},
{
"name": "43009",
"tags": [
"exploit",
"x_refsource_EXPLOIT-DB"
],
"url": "https://www.exploit-db.com/exploits/43009/"
},
{
"name": "RHSA-2018:0003",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:0003"
},
{
"name": "RHSA-2017:3123",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:3123"
},
{
"name": "RHSA-2018:0005",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2018:0005"
},
{
"name": "RHSA-2017:3244",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:3244"
},
{
"name": "RHSA-2017:3124",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2017:3124"
},
{
"name": "[www-announce] 20171019 [SECURITY] CVE-2017-12629: Several critical vulnerabilities discovered in Apache Solr (XXE \u0026 RCE)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://mail-archives.us.apache.org/mod_mbox/www-announce/201710.mbox/%3CCAOOKt51UO_6Vy%3Dj8W%3Dx1pMbLW9VJfZyFWz7pAnXJC_OAdSZubA%40mail.gmail.com%3E"
},
{
"name": "DSA-4124",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2018/dsa-4124"
},
{
"name": "USN-4259-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4259-1/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://twitter.com/ApacheSolr/status/918731485611401216"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://twitter.com/searchtools_avi/status/918904813613543424"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://openwall.com/lists/oss-security/2017/10/13/1"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://twitter.com/joshbressers/status/919258716297420802"
},
{
"name": "[solr-users] 20210618 CVE-2021-27905 Apache Solr ReplicationHandler/SSRF vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef%40%3Cusers.solr.apache.org%3E"
},
{
"name": "[solr-users] 20210618 Re: CVE-2021-27905 Apache Solr ReplicationHandler/SSRF vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc%40%3Cusers.solr.apache.org%3E"
},
{
"name": "[solr-users] 20210728 Re: CVE-2021-27905 Apache Solr ReplicationHandler/SSRF vulnerability",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314%40%3Cusers.solr.apache.org%3E"
},
{
"name": "[jackrabbit-oak-issues] 20210817 [jira] [Created] (OAK-9537) Security vulnerability in org/apache/lucene/queryparser/xml/CoreParser.java",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.apache.org/thread.html/r26c996b068ef6c5e89aa59acb769025cfd343a08e63fbe9e7f3f720f%40%3Coak-issues.jackrabbit.apache.org%3E"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@apache.org",
"ID": "CVE-2017-12629",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Apache Solr before 7.1 with Apache Lucene before 7.1",
"version": {
"version_data": [
{
"version_value": "Apache Solr before 7.1 with Apache Lucene before 7.1"
},
{
"version_affected": "\u003c",
"version_name": "lucene-solr",
"version_value": "7.1.0"
},
{
"version_affected": "\u003c",
"version_name": "lucene-solr",
"version_value": "6.6.2"
},
{
"version_affected": "\u003c",
"version_name": "lucene-solr",
"version_value": "5.5.5"
},
{
"version_affected": "!",
"version_name": "lucene-solr",
"version_value": "7.2.0"
},
{
"version_affected": "!",
"version_name": "lucene-solr",
"version_value": "8.0.0"
},
{
"platform": "redhat",
"version_affected": "\u003c",
"version_name": "lucene-solr",
"version_value": "5.3.1-redhat-2"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote code execution"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "RHSA-2017:3451",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3451"
},
{
"name": "[lucene-dev] 20171012 Re: Several critical vulnerabilities discovered in Apache Solr (XXE \u0026 RCE)",
"refsource": "MLIST",
"url": "https://s.apache.org/FJDl"
},
{
"name": "RHSA-2018:0002",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0002"
},
{
"name": "101261",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/101261"
},
{
"name": "RHSA-2018:0004",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0004"
},
{
"name": "RHSA-2017:3452",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3452"
},
{
"name": "[debian-lts-announce] 20180121 [SECURITY] [DLA 1254-1] lucene-solr security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2018/01/msg00028.html"
},
{
"name": "43009",
"refsource": "EXPLOIT-DB",
"url": "https://www.exploit-db.com/exploits/43009/"
},
{
"name": "RHSA-2018:0003",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0003"
},
{
"name": "RHSA-2017:3123",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3123"
},
{
"name": "RHSA-2018:0005",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2018:0005"
},
{
"name": "RHSA-2017:3244",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3244"
},
{
"name": "RHSA-2017:3124",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2017:3124"
},
{
"name": "[www-announce] 20171019 [SECURITY] CVE-2017-12629: Several critical vulnerabilities discovered in Apache Solr (XXE \u0026 RCE)",
"refsource": "MLIST",
"url": "http://mail-archives.us.apache.org/mod_mbox/www-announce/201710.mbox/%3CCAOOKt51UO_6Vy%3Dj8W%3Dx1pMbLW9VJfZyFWz7pAnXJC_OAdSZubA%40mail.gmail.com%3E"
},
{
"name": "DSA-4124",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4124"
},
{
"name": "USN-4259-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4259-1/"
},
{
"name": "https://twitter.com/ApacheSolr/status/918731485611401216",
"refsource": "MISC",
"url": "https://twitter.com/ApacheSolr/status/918731485611401216"
},
{
"name": "https://twitter.com/searchtools_avi/status/918904813613543424",
"refsource": "MISC",
"url": "https://twitter.com/searchtools_avi/status/918904813613543424"
},
{
"name": "http://openwall.com/lists/oss-security/2017/10/13/1",
"refsource": "MISC",
"url": "http://openwall.com/lists/oss-security/2017/10/13/1"
},
{
"name": "https://twitter.com/joshbressers/status/919258716297420802",
"refsource": "MISC",
"url": "https://twitter.com/joshbressers/status/919258716297420802"
},
{
"name": "[solr-users] 20210618 CVE-2021-27905 Apache Solr ReplicationHandler/SSRF vulnerability",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3E"
},
{
"name": "[solr-users] 20210618 Re: CVE-2021-27905 Apache Solr ReplicationHandler/SSRF vulnerability",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3E"
},
{
"name": "[solr-users] 20210728 Re: CVE-2021-27905 Apache Solr ReplicationHandler/SSRF vulnerability",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3E"
},
{
"name": "[jackrabbit-oak-issues] 20210817 [jira] [Created] (OAK-9537) Security vulnerability in org/apache/lucene/queryparser/xml/CoreParser.java",
"refsource": "MLIST",
"url": "https://lists.apache.org/thread.html/r26c996b068ef6c5e89aa59acb769025cfd343a08e63fbe9e7f3f720f@%3Coak-issues.jackrabbit.apache.org%3E"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2017-12629",
"datePublished": "2017-10-14T21:00:00",
"dateReserved": "2017-08-07T00:00:00",
"dateUpdated": "2024-08-05T18:43:56.440Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…