GHSA-4p5m-gvpf-f3x5
GHSA-68r2-fwcg-qpm8
This commit is contained in:
advisory-database[bot] 2025-01-27 09:32:09 +00:00
Родитель ef48511b8b
Коммит 0e8e14a685
2 изменённых файлов: 70 добавлений и 0 удалений

Просмотреть файл

@ -0,0 +1,35 @@
{
"schema_version": "1.4.0",
"id": "GHSA-4p5m-gvpf-f3x5",
"modified": "2025-01-27T09:30:35Z",
"published": "2025-01-27T09:30:35Z",
"aliases": [
"CVE-2024-52012"
],
"details": "Relative Path Traversal vulnerability in Apache Solr.\n\nSolr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the \"configset upload\" API.  Commonly known as a \"zipslip\", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.  \nThis issue affects Apache Solr: from 6.6 through 9.7.0.\n\nUsers are recommended to upgrade to version 9.8.0, which fixes the issue.  Users unable to upgrade may also safely prevent the issue by using Solr's \"Rule-Based Authentication Plugin\" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.",
"severity": [],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52012"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/yp39pgbv4vf1746pf5yblz84lv30vfxd"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/01/26/2"
}
],
"database_specific": {
"cwe_ids": [
"CWE-23"
],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-27T09:15:14Z"
}
}

Просмотреть файл

@ -0,0 +1,35 @@
{
"schema_version": "1.4.0",
"id": "GHSA-68r2-fwcg-qpm8",
"modified": "2025-01-27T09:30:35Z",
"published": "2025-01-27T09:30:35Z",
"aliases": [
"CVE-2025-24814"
],
"details": "Core creation allows users to replace \"trusted\" configset files with arbitrary configuration\n\nSolr instances that (1) use the \"FileSystemConfigSetService\" component (the default in \"standalone\" or \"user-managed\" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual \"trusted\" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem.  These replacement config files are treated as \"trusted\" and can use \"<lib>\" tags to add to Solr's classpath, which an attacker might use to load malicious code as a searchComponent or other plugin.\n\nThis issue affects all Apache Solr versions up through Solr 9.7.  Users can protect against the vulnerability by enabling authentication and authorization on their Solr clusters or switching to SolrCloud (and away from \"FileSystemConfigSetService\").  Users are also recommended to upgrade to Solr 9.8.0, which mitigates this issue by disabling use of \"<lib>\" tags by default.",
"severity": [],
"affected": [],
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24814"
},
{
"type": "WEB",
"url": "https://lists.apache.org/thread/gl291pn8x9f9n52ys5l0pc0b6qtf0qw1"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2025/01/26/1"
}
],
"database_specific": {
"cwe_ids": [
"CWE-250"
],
"severity": null,
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-27T09:15:14Z"
}
}