Core creation allows users to replace "trusted" configset files with arbitrary configuration Solr instances that (1) use the "FileSystemConfigSetService" component (the default in "standalone" or "user-managed" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual "trusted" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem.  These replacement config files are treated as "trusted" and can use "<lib>" tags to add to Solr's classpath, which an attacker might use to load malicious code as a searchComponent or other plugin. This issue affects all Apache Solr versions up through Solr 9.7.  Users can protect against the vulnerability by enabling authentication and authorization on their Solr clusters or switching to SolrCloud (and away from "FileSystemConfigSetService").  Users are also recommended to upgrade to Solr 9.8.0, which mitigates this issue by disabling use of "<lib>" tags by default.
History

Sat, 15 Feb 2025 01:30:00 +0000

Type Values Removed Values Added
References

Thu, 06 Feb 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


Tue, 28 Jan 2025 14:30:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 4.6, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L'}

threat_severity

Low


Mon, 27 Jan 2025 09:45:00 +0000

Type Values Removed Values Added
References

Mon, 27 Jan 2025 09:15:00 +0000

Type Values Removed Values Added
Description Core creation allows users to replace "trusted" configset files with arbitrary configuration Solr instances that (1) use the "FileSystemConfigSetService" component (the default in "standalone" or "user-managed" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual "trusted" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem.  These replacement config files are treated as "trusted" and can use "<lib>" tags to add to Solr's classpath, which an attacker might use to load malicious code as a searchComponent or other plugin. This issue affects all Apache Solr versions up through Solr 9.7.  Users can protect against the vulnerability by enabling authentication and authorization on their Solr clusters or switching to SolrCloud (and away from "FileSystemConfigSetService").  Users are also recommended to upgrade to Solr 9.8.0, which mitigates this issue by disabling use of "<lib>" tags by default.
Title Apache Solr: Core-creation with "trusted" configset can use arbitrary untrusted files
Weaknesses CWE-250
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-01-27T08:58:08.768Z

Updated: 2025-02-15T00:10:36.558Z

Reserved: 2025-01-24T12:48:40.114Z

Link: CVE-2025-24814

cve-icon Vulnrichment

Updated: 2025-02-15T00:10:36.558Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-01-27T09:15:14.947

Modified: 2025-02-15T01:15:11.157

Link: CVE-2025-24814

cve-icon Redhat

Severity : Low

Publid Date: 2025-01-27T08:58:08Z

Links: CVE-2025-24814 - Bugzilla