- Description
- Apache Solr 5.0.0 to Apache Solr 8.3.1 are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined configset could contain renderable, potentially malicious, templates. Parameter provided templates are disabled by default, but can be enabled by setting `params.resource.loader.enabled` by defining a response writer with that setting set to `true`. Defining a response writer requires configuration API access. Solr 8.4 removed the params resource loader entirely, and only enables the configset-provided template rendering when the configset is `trusted` (has been uploaded by an authenticated user).
- Source
- security@apache.org
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 5.9
- Exploitability score
- 1.6
- Vector string
- CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 4.6
- Impact score
- 6.4
- Exploitability score
- 3.9
- Vector string
- AV:N/AC:H/Au:S/C:P/I:P/A:P
Data from CISA
- Vulnerability name
- Apache Solr VelocityResponseWriter Plug-In Remote Code Execution Vulnerability
- Exploit added on
- Nov 3, 2021
- Exploit action due
- May 3, 2022
- Required action
- Apply updates per vendor instructions.
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FB21C976-BDB8-4C23-8D75-D80EED433743",
"versionEndExcluding": "7.7.3",
"versionStartIncluding": "5.0.0"
},
{
"criteria": "cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4AE21606-4430-4CE0-ACFE-860199DC6D96",
"versionEndExcluding": "8.4.0",
"versionStartIncluding": "8.0.0"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:primavera_unifier:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "08FA59A8-6A62-4B33-8952-D6E658F8DAC9",
"versionEndIncluding": "17.12",
"versionStartIncluding": "17.7"
},
{
"criteria": "cpe:2.3:a:oracle:primavera_unifier:16.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D55A54FD-7DD1-49CD-BE81-0BE73990943C"
},
{
"criteria": "cpe:2.3:a:oracle:primavera_unifier:16.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "82EB08C0-2D46-4635-88DF-E54F6452D3A3"
},
{
"criteria": "cpe:2.3:a:oracle:primavera_unifier:18.8:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "202AD518-2E9B-4062-B063-9858AE1F9CE2"
},
{
"criteria": "cpe:2.3:a:oracle:primavera_unifier:19.12:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "10864586-270E-4ACF-BDCC-ECFCD299305F"
}
],
"operator": "OR"
}
]
}
]