1. About the Vulnerability

Vulnerability Name

Apache Solr Remote Code Execution Vulnerability (CVE-2023-50386)

Release Date

February 20, 2024

Component Name

Apache Solr

Affected Versions

6.0.0 ≤ Apache Solr < 8.11.3
9.0.0 ≤ Apache Solr < 9.4.1

Vulnerability Type

Remote Code Execution via
CWE-434: Unrestricted Upload of File with Dangerous Type
CWE-913: Improper Control of Dynamically-Managed Code Resources

Severity

CVSS v3 Base Score: 8.8 (High)

Exploitability

Attack Vector: Network

Attack Complexity: Low

Privileges Required: Low

User Interaction: None

Impact

Confidentiality Impact: High

Integrity Impact: High

Availability Impact: High

 

2. About CVE-2023-50386

2.1 About the Component

Apache Solr is an open-source enterprise search platform written in Java. It is based on the Apache Lucene library and features high-performance full-text search.

2.2 About the Vulnerability

On February 20, 2024, Sangfor FarSight Labs received notification of the remote code execution vulnerability (CVE-2023-50386) in Apache Solr, classified as High severity (CVSS Score 8.8) by NVD.

This vulnerability in Apache Solr is caused by Solr ConfigSets accepting Java jar and class files to be uploaded through the ConfigSets API. When backing up Solr Collections, these ConfigSet files would be saved to disk when using the LocalFileSystemRepository (the default for backups). If the backup was saved to a directory that Solr uses in its ClassPath/ClassLoaders, then the jar and class files would be available to use with any ConfigSet, trusted or untrusted.

Attackers can exploit this vulnerability by crafting malicious class files and using the backup function to upload and execute these files, thereby obtaining server permissions.

3. Affected Versions

6.0.0 ≤ Apache Solr < 8.11.3

9.0.0 ≤ Apache Solr < 9.4.1

4. Solutions

4.1 Remediation Solutions

4.1.1 Official Solution

Apache has released new versions of Apache Solr, and affected users are strongly recommended to update to the latest version to fix the vulnerability. For more information, visit https://solr.apache.org/downloads.html

4.2 Sangfor Solutions

4.2.1 Security Monitoring

The following Sangfor products and services perform real-time monitoring of assets affected by the Apache Solr remote code execution vulnerability (CVE-2023-50386): 

4.2.2 Security Protection

The following Sangfor products and services provide protection against the Apache Solr remote code execution vulnerability (CVE-2023-50386): 

5. Timeline

On February 20, 2024, Sangfor FarSight Labs received notification of the Apache Solr remote code execution vulnerability (CVE-2023-50386).

On February 20, 2024, Sangfor FarSight Labs released a vulnerability alert with remediation solutions.

6. References

https://solr.apache.org/security.html#cve-2023-50386-apache-solr-backuprestore-apis-allow-for-deployment-of-executables-in-malicious-configsets

https://nvd.nist.gov/vuln/detail/CVE-2023-50386

7. About Sangfor FarSight Labs

Sangfor FarSight Labs researches the latest cyberthreats and unknown zero-day vulnerabilities, alerting customers to potential dangers to their organizations, and providing real-time solutions with actionable intelligence. Sangfor FarSight Labs works with other security vendors and the security community at large to identify and verify global cyberthreats, providing fast and easy protection for customers.

Listen To This Post

Search

Get in Touch

Get in Touch with Sangfor Team for Business Inquiry

Related Articles

CVE-2024-47575: Fortinet FortiManager Authentication Vulnerability

Date : 25 Oct 2024
Read Now

CVE-2024-38819: Path Traversal Vulnerability

Date : 19 Oct 2024
Read Now

CVE-2024-40766: SonicWALL SonicOS Access Control Flaw Vulnerability

Date : 12 Sep 2024
Read Now

See Other Product

Platform-X
Sangfor Access Secure
Sangfor SSL VPN
Best Darktrace Cyber Security Competitors and Alternatives in 2024
Sangfor Omni-Command
Replace your Enterprise NGAV with Sangfor Endpoint Secure