Lucene search

K
ubuntucveUbuntu.comUB:CVE-2023-50290
HistoryJan 15, 2024 - 12:00 a.m.

CVE-2023-50290

2024-01-1500:00:00
ubuntu.com
ubuntu.com
21
cve-2023-50290
apache solr
sensitive information
unauthorized actor
metrics api
environment variables
authorization
vulnerability
unix

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.4

Confidence

High

EPSS

0.172

Percentile

96.2%

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in
Apache Solr. The Solr Metrics API publishes all unprotected environment
variables available to each Apache Solr instance. Users are able to specify
which environment variables to hide, however, the default list is designed
to work for known secret Java system properties. Environment variables
cannot be strictly defined in Solr, like Java system properties can be, and
may be set for the entire host, unlike Java system properties which are set
per-Java-proccess. The Solr Metrics API is protected by the “metrics-read”
permission. Therefore, Solr Clouds with Authorization setup will only be
vulnerable via users with the “metrics-read” permission. This issue affects
Apache Solr: from 9.0.0 before 9.3.0. Users are recommended to upgrade to
version 9.3.0 or later, in which environment variables are not published
via the Metrics API.

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.4

Confidence

High

EPSS

0.172

Percentile

96.2%