CVE-2024-52012

Published Jan 27, 2025

Last updated 8 months ago

Overview

Description
Relative Path Traversal vulnerability in Apache Solr. Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the "configset upload" API.  Commonly known as a "zipslip", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.   This issue affects Apache Solr: from 6.6 through 9.7.0. Users are recommended to upgrade to version 9.8.0, which fixes the issue.  Users unable to upgrade may also safely prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.
Source
security@apache.org
NVD status
Analyzed
Products
solr

Risk scores

CVSS 3.1

Type
Secondary
Base score
5.4
Impact score
2.5
Exploitability score
2.8
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Severity
MEDIUM

Weaknesses

security@apache.org
CWE-23

Social media

Hype score
Not currently trending
  1. Apache Solr の脆弱性 CVE-2024-52012/24814 が FIX:ただちにパッチを! https://t.co/Nefzesc0GB Apache Solr の2つの脆弱性が FIX しました。すでにパッチ・バージョンがリリースされていますが、緩和策もあるようです。ご利用のチームは、ご確認ください。 #Apache #API #CVE202452012… https://t.co/g5jU7VktfX

    @iototsecnews

    5 Feb 2025

    84 Impressions

    1 Retweet

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. Threat Alert: Apache Solr Vulnerabilities CVE-2024-52012 and CVE-2025-24814 Expose Systems to CVE-2025-24814 CVE-2024-52012 Severity: 🔴 High Maturity: 💢 Emerging Learn more: https://t.co/lZbohqjzl2 #CyberSecurity #ThreatIntel #InfoSec

    @fletch_ai

    28 Jan 2025

    47 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  3. Apache Solr Vulnerabilities CVE-2024-52012 and CVE-2025-24814 Expose Systems to File Write and Code Execution Risks https://t.co/7o0N7idjhR

    @Dinosn

    27 Jan 2025

    2018 Impressions

    10 Retweets

    22 Likes

    3 Bookmarks

    0 Replies

    0 Quotes

  4. CVE-2024-52012 Relative Path Traversal vulnerability in Apache Solr. Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-san… https://t.co/NO6Fl0gsrM

    @CVEnew

    27 Jan 2025

    536 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  5. CVE-2025-24814: Apache Solr: Core-creation with "trusted" configset can use arbitrary untrusted files https://t.co/gpIKdVQC7t CVE-2024-52012: Apache Solr: Configset upload on Windows allows arbitrary path write-access https://t.co/OygBilIUyF

    @oss_security

    26 Jan 2025

    259 Impressions

    0 Retweets

    2 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. CVE-2024-52012 CVE-2024-52012 https://t.co/eRYTQbWrcc

    @VulmonFeeds

    26 Jan 2025

    48 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

Configurations

  1. The "create core" API of Apache Solr 8.6 through 9.10.0 lacks sufficient input validation on some API parameters, which can cause Solr to check the existence of and attempt to read file-system paths that should be disallowed by Solr's "allowPaths" security setting https://https://solr.apache.org/guide/solr/latest/configuration-guide/configuring-solr-xml.html#the-solr-element .  These read-only accesses can allow users to create cores using unexpected configsets if any are accessible via the filesystem.  On Windows systems configured to allow UNC paths this can additionally cause disclosure of NTLM "user" hashes.  Solr deployments are subject to this vulnerability if they meet the following criteria: * Solr is running in its "standalone" mode. * Solr's "allowPath" setting is being used to restrict file access to certain directories. * Solr's "create core" API is exposed and accessible to untrusted users.  This can happen if Solr's RuleBasedAuthorizationPlugin https://solr.apache.org/guide/solr/latest/deployment-guide/rule-based-authorization-plugin.html is disabled, or if it is enabled but the "core-admin-edit" predefined permission (or an equivalent custom permission) is given to low-trust (i.e. non-admin) user roles. Users can mitigate this by enabling Solr's RuleBasedAuthorizationPlugin (if disabled) and configuring a permission-list that prevents untrusted users from creating new Solr cores.  Users should also upgrade to Apache Solr 9.10.1 or greater, which contain fixes for this issue.CVE-2026-22444