Apache Solr Flaw Grants Attackers Write Access

Apache Solr Flaw Grants Attackers Write Access

A new Apache Solr vulnerability, affecting versions 6.6 to 9.7.0, exposes Windows instances to risks of file manipulation and write access due to a Relative Path Traversal flaw. Tracked as SOLR-17543, the issue allows attackers to exploit the “configset upload” API using a maliciously crafted ZIP file.

Critical Apache Solr Flaw

The vulnerability in Solr’s “configset upload” API arises from inadequate input sanitization, allowing attackers to perform a “zipslip” attack. By using malicious ZIP files with relative file paths, attackers can overwrite or create files in unintended locations.

Windows systems are especially vulnerable due to exploitable file path handling. This attack grants unauthorized write access to critical files, potentially compromising the Solr application and the entire system.

Mitigation

Apache Solr has released version 9.8.0, which fixes the vulnerability.

Users on affected versions should upgrade to 9.8.0 to protect their systems.

Organizations unable to upgrade immediately can mitigate the risk by using Solr’s “Rule-Based Authentication Plugin.” Configuring this plugin to limit access to the “configset upload” API to trusted administrators or users reduces the chance of exploitation.

Implementing proper access controls ensures only authorized individuals or systems can use the sensitive API, reducing exposure to the vulnerability.

This issue highlights the importance of keeping software updated and maintaining strong security measures. Users should assess their Solr deployments for potential exposure, especially on Windows systems, which face higher exploitation risks.

Organizations should review access policies, monitor API activity for anomalies, and apply patches or mitigations promptly. The discovery of SOLR-17543 underscores the need for vigilance in securing open-source software.

While Solr 9.8.0 offers a permanent fix, interim safeguards like authentication and API restrictions are essential for protecting sensitive systems.

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!