CVE-2024-52012 (GCVE-0-2024-52012)
Vulnerability from cvelistv5
Published
2025-01-27 08:54
Modified
2025-02-06 16:11
Severity ?
EPSS score ?
Summary
Relative Path Traversal vulnerability in Apache Solr.
Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the "configset upload" API. Commonly known as a "zipslip", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.
This issue affects Apache Solr: from 6.6 through 9.7.0.
Users are recommended to upgrade to version 9.8.0, which fixes the issue. Users unable to upgrade may also safely prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Apache Software Foundation | Apache Solr |
Version: 6.6 ≤ 9.7.0 |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2025-01-27T09:03:17.022Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { url: "http://www.openwall.com/lists/oss-security/2025/01/26/2", }, ], title: "CVE Program Container", }, { metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.4, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", version: "3.1", }, }, { other: { content: { id: "CVE-2024-52012", options: [ { Exploitation: "none", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2025-01-27T13:34:11.686039Z", version: "2.0.3", }, type: "ssvc", }, }, ], providerMetadata: { dateUpdated: "2025-02-06T16:11:37.353Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "Apache Solr", vendor: "Apache Software Foundation", versions: [ { lessThanOrEqual: "9.7.0", status: "affected", version: "6.6", versionType: "semver", }, ], }, ], credits: [ { lang: "en", type: "finder", value: "rry", }, ], descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<p>Relative Path Traversal vulnerability in Apache Solr.</p>Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the \"configset upload\" API. Commonly known as a \"zipslip\", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem. <br><p>This issue affects Apache Solr: from 6.6 through 9.7.0.</p><p>Users are recommended to upgrade to version 9.8.0, which fixes the issue. Users unable to upgrade may also safely prevent the issue by using Solr's \"Rule-Based Authentication Plugin\" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.</p>", }, ], value: "Relative Path Traversal vulnerability in Apache Solr.\n\nSolr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the \"configset upload\" API. Commonly known as a \"zipslip\", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem. \nThis issue affects Apache Solr: from 6.6 through 9.7.0.\n\nUsers are recommended to upgrade to version 9.8.0, which fixes the issue. Users unable to upgrade may also safely prevent the issue by using Solr's \"Rule-Based Authentication Plugin\" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.", }, ], metrics: [ { other: { content: { text: "moderate", }, type: "Textual description of severity", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-23", description: "CWE-23 Relative Path Traversal", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-01-27T08:54:42.907Z", orgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", shortName: "apache", }, references: [ { tags: [ "vendor-advisory", ], url: "https://lists.apache.org/thread/yp39pgbv4vf1746pf5yblz84lv30vfxd", }, ], source: { defect: [ "SOLR-17543", ], discovery: "EXTERNAL", }, title: "Apache Solr: Configset upload on Windows allows arbitrary path write-access", x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "f0158376-9dc2-43b6-827c-5f631a4d8d09", assignerShortName: "apache", cveId: "CVE-2024-52012", datePublished: "2025-01-27T08:54:42.907Z", dateReserved: "2024-11-04T19:07:57.861Z", dateUpdated: "2025-02-06T16:11:37.353Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { nvd: "{\"cve\":{\"id\":\"CVE-2024-52012\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2025-01-27T09:15:14.693\",\"lastModified\":\"2025-02-06T17:15:19.480\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Relative Path Traversal vulnerability in Apache Solr.\\n\\nSolr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the \\\"configset upload\\\" API. Commonly known as a \\\"zipslip\\\", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem. \\nThis issue affects Apache Solr: from 6.6 through 9.7.0.\\n\\nUsers are recommended to upgrade to version 9.8.0, which fixes the issue. Users unable to upgrade may also safely prevent the issue by using Solr's \\\"Rule-Based Authentication Plugin\\\" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad de Relative Path Traversal en Apache Solr. Las instancias de Solr que se ejecutan en Windows son vulnerables al acceso de escritura a rutas de archivo arbitrarias, debido a la falta de desinfección de entrada en la API de \\\"carga de conjuntos de configuración\\\". Los archivos ZIP creados de forma malintencionada, conocidos comúnmente como \\\"zipslip\\\", pueden usar rutas de archivo relativas para escribir datos en partes no previstas del sistema de archivos. Este problema afecta a Apache Solr: desde la versión 6.6 hasta la 9.7.0. Se recomienda a los usuarios que actualicen a la versión 9.8.0, que soluciona el problema. Los usuarios que no puedan actualizar también pueden evitar el problema de forma segura utilizando el \\\"complemento de autenticación basada en reglas\\\" de Solr para restringir el acceso a la API de carga de conjuntos de configuración, de modo que solo pueda acceder a ella un conjunto confiable de administradores/usuarios.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\",\"baseScore\":5.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.5}]},\"weaknesses\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-23\"}]}],\"references\":[{\"url\":\"https://lists.apache.org/thread/yp39pgbv4vf1746pf5yblz84lv30vfxd\",\"source\":\"security@apache.org\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2025/01/26/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.openwall.com/lists/oss-security/2025/01/26/2\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-01-27T09:03:17.022Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.4, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-52012\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-27T13:34:11.686039Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-27T13:35:05.580Z\"}}], \"cna\": {\"title\": \"Apache Solr: Configset upload on Windows allows arbitrary path write-access\", \"source\": {\"defect\": [\"SOLR-17543\"], \"discovery\": \"EXTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"rry\"}], \"metrics\": [{\"other\": {\"type\": \"Textual description of severity\", \"content\": {\"text\": \"moderate\"}}}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Solr\", \"versions\": [{\"status\": \"affected\", \"version\": \"6.6\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"9.7.0\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://lists.apache.org/thread/yp39pgbv4vf1746pf5yblz84lv30vfxd\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Relative Path Traversal vulnerability in Apache Solr.\\n\\nSolr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the \\\"configset upload\\\" API.\\u00a0 Commonly known as a \\\"zipslip\\\", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.\\u00a0\\u00a0\\nThis issue affects Apache Solr: from 6.6 through 9.7.0.\\n\\nUsers are recommended to upgrade to version 9.8.0, which fixes the issue.\\u00a0 Users unable to upgrade may also safely prevent the issue by using Solr's \\\"Rule-Based Authentication Plugin\\\" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"<p>Relative Path Traversal vulnerability in Apache Solr.</p>Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the \\\"configset upload\\\" API. Commonly known as a \\\"zipslip\\\", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem. <br><p>This issue affects Apache Solr: from 6.6 through 9.7.0.</p><p>Users are recommended to upgrade to version 9.8.0, which fixes the issue. Users unable to upgrade may also safely prevent the issue by using Solr's \\\"Rule-Based Authentication Plugin\\\" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.</p>\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-23\", \"description\": \"CWE-23 Relative Path Traversal\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2025-01-27T08:54:42.907Z\"}}}", cveMetadata: "{\"cveId\": \"CVE-2024-52012\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-06T16:11:37.353Z\", \"dateReserved\": \"2024-11-04T19:07:57.861Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2025-01-27T08:54:42.907Z\", \"assignerShortName\": \"apache\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.