| CVE-ID |
CVE-2017-12629
|
• CVSS Severity Rating • Fix Information • Vulnerable Software Versions • SCAP Mappings • CPE Information
|
| Description |
| Remote code execution occurs in Apache Solr before 7.1 with Apache
Lucene before 7.1 by exploiting XXE in conjunction with use of a
Config API add-listener command to reach the RunExecutableListener
class. Elasticsearch, although it uses Lucene, is NOT vulnerable to
this. Note that the XML external entity expansion vulnerability occurs
in the XML Query Parser which is available, by default, for any query
request with parameters deftype=xmlparser and can be exploited to
upload malicious data to the /upload request handler or as Blind XXE
using ftp wrapper in order to read arbitrary local files from the Solr
server. Note also that the second vulnerability relates to remote code
execution using the RunExecutableListener available on all affected
versions of Solr.
|
| References |
|
Note: References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
|
|
|
| Assigning CNA |
| Apache Software Foundation |
| Date Entry Created |
| 20170807 |
Disclaimer: The entry creation date may reflect when
the CVE ID was allocated or reserved, and does not
necessarily indicate when this vulnerability was
discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE.
|
| Phase (Legacy) |
| Assigned (20170807) |
| Votes (Legacy) |
|
| Comments (Legacy) |
|
| Proposed (Legacy) |
| N/A |
|
This is an entry on the CVE List, which provides common identifiers for publicly known cybersecurity vulnerabilities. |
|
|
|
For More Information: cve@mitre.org
|