This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated files can be uploaded as configsets using Solr’s API, allowing to exploit that vulnerability.
github.com/advisories/GHSA-7px3-6f6g-hxcj
github.com/apache/lucene-solr/commit/1880d4824e6c5f98170b9a00aad1d437ee2aa12
github.com/apache/lucene-solr/commit/3aa6086ed99fa7158d423dc7c33dae6da466b09
github.com/apache/lucene-solr/commit/d1baf6ba593561f39e2da0a71a8440797005b55
github.com/apache/lucene-solr/commit/e5407c5a9710247e5f728aae36224a245a51f0b
issues.apache.org/jira/browse/SOLR-12450
mail-archives.apache.org/mod_mbox/lucene-solr-user/201807.mbox/%3C0cdc01d413b7%24f97ba580%24ec72f080%24%40apache.org%3E
nvd.nist.gov/vuln/detail/CVE-2018-8026
security.netapp.com/advisory/ntap-20190307-0002