XML External Entity Vulnerability in Apache Solr Affects Multiple Versions
CVE-2018-1308
7.5HIGH
Summary
This vulnerability in Apache Solr allows attackers to exploit the XML external entity expansion (XXE) in the &dataConfig=<inlinexml>
parameter of Solr's DataImportHandler. By manipulating this parameter, an attacker could leverage protocols like file, ftp, or http to read arbitrary files from the Solr server or the internal network. This poses significant risks to the confidentiality of sensitive data stored on the server and emphasizes the need for immediate remediation.
Affected Version(s)
Apache Solr 1.2 to 6.6.2
Apache Solr 7.0.0 to 7.2.1
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved