This vulnerability in Apache Solr 1.2 to 6.6.2 and 7.0.0 to 7.2.1 relates to an XML external entity expansion (XXE) in the `&dataConfig=<inlinexml>` parameter of Solr's DataImportHandler. It can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network.
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
Link | Tags |
---|---|
https://www.debian.org/security/2018/dsa-4194 | third party advisory vendor advisory |
https://lists.debian.org/debian-lts-announce/2018/04/msg00025.html | third party advisory mailing list |
https://mail-archives.apache.org/mod_mbox/www-announce/201804.mbox/%3C000001d3cf68%245ac69af0%241053d0d0%24%40apache.org%3E | mailing list third party advisory mitigation |
https://issues.apache.org/jira/browse/SOLR-11971 | issue tracking third party advisory |
https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E | mailing list |