CVE-2024-52012

Relative Path Traversal vulnerability in Apache Solr. Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the "configset upload" API.  Commonly known as a "zipslip", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.   This issue affects Apache Solr: from 6.6 through 9.7.0. Users are recommended to upgrade to version 9.8.0, which fixes the issue.  Users unable to upgrade may also safely prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.
References
Link Resource
https://lists.apache.org/thread/yp39pgbv4vf1746pf5yblz84lv30vfxd Mailing List Vendor Advisory
http://www.openwall.com/lists/oss-security/2025/01/26/2 Mailing List Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-01-27 09:15

Updated : 2025-06-27 19:32


NVD link : CVE-2024-52012

Mitre link : CVE-2024-52012

CVE.ORG link : CVE-2024-52012


JSON object : View

Products Affected

apache

  • solr
CWE
CWE-23

Relative Path Traversal