XML External Entity Vulnerability in Apache Solr 6.0 to 7.3
CVE-2018-8026
5.5MEDIUM
Summary
This vulnerability allows attackers to exploit certain XML configuration files within Apache Solr versions ranging from 6.0.0 to 7.3.1. By leveraging XML External Entity (XXE) processing, attackers can manipulate config files such as currency.xml and enumsConfig.xml to read arbitrary local files from the Solr server or the internal network. This risk is amplified because the affected files can be uploaded as configsets using Solr's API, potentially exposing sensitive information to unauthorized users.
Affected Version(s)
Apache Solr 6.0.0 to 6.6.4
Apache Solr 7.0.0 to 7.3.1
References
CVSS V3.1
Score:
5.5
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved