We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-45216

Apache Solr: Authentication bypass possible using a fake URL Path ending



Description

Improper Authentication vulnerability in Apache Solr. Solr instances using the PKIAuthenticationPlugin, which is enabled by default when Solr Authentication is used, are vulnerable to Authentication bypass. A fake ending at the end of any Solr API URL path, will allow requests to skip Authentication while maintaining the API contract with the original URL Path. This fake ending looks like an unprotected API path, however it is stripped off internally after authentication but before API routing. This issue affects Apache Solr: from 5.3.0 before 8.11.4, from 9.0.0 before 9.7.0. Users are recommended to upgrade to version 9.7.0, or 8.11.4, which fix the issue.

Reserved 2024-08-23 | Published 2024-10-16 | Updated 2024-11-08 | Assigner apache

Problem types

CWE-287 Improper Authentication

Product status

Default status
unaffected

5.3.0 before 8.11.4
affected

9.0.0 before 9.7.0
affected

Credits

Liu Huajin reporter

References

solr.apache.org/security.html vendor-advisory

cve.org (CVE-2024-45216)

nvd.nist.gov (CVE-2024-45216)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-45216

Support options

Helpdesk Chat, Email, Knowledgebase