Lucene search

K
debiancveDebian Security Bug TrackerDEBIANCVE:CVE-2023-50290
HistoryJan 15, 2024 - 10:15 a.m.

CVE-2023-50290

2024-01-1510:15:26
Debian Security Bug Tracker
security-tracker.debian.org
21
apache solr
information exposure
unauthorized access
vulnerability
environment variables
metrics api
authorization setup
upgrade required
cve-2023-50290

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.5

Confidence

High

EPSS

0.172

Percentile

96.2%

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr. The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance. Users are able to specify which environment variables to hide, however, the default list is designed to work for known secret Java system properties. Environment variables cannot be strictly defined in Solr, like Java system properties can be, and may be set for the entire host,Β unlike Java system properties which are set per-Java-proccess. The Solr Metrics API is protected by the β€œmetrics-read” permission. Therefore, Solr Clouds with Authorization setup will only be vulnerable via users with the β€œmetrics-read” permission. This issue affects Apache Solr: from 9.0.0 before 9.3.0. Users are recommended to upgrade to version 9.3.0 or later, in which environment variables are not published via the Metrics API.

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.5

Confidence

High

EPSS

0.172

Percentile

96.2%