Wednesday, April 16, 2025
HomeCVE/vulnerabilityApache Solr For Windows instances Vulnerability Allows Arbitrary Path Write-Access

Apache Solr For Windows instances Vulnerability Allows Arbitrary Path Write-Access

Published on

SIEM as a Service

Follow Us on Google News

A critical security vulnerability (CVE-2024-52012) affecting Apache Solr instances on Windows has been identified, allowing attackers to gain arbitrary file path write access using the “configset upload” API.

The flaw, categorized as a relative path traversal vulnerability, poses a moderate security risk and affects Apache Solr versions from 6.6 through 9.7.0.

Vulnerability Details

This recently disclosed issue exploits a “Zip Slip” vulnerability within the “configset upload” API of Solr when running on Windows.

- Advertisement - Google News

The vulnerability stems from insufficient input validation and sanitization in the handling of ZIP archives. Malicious actors can manipulate ZIP files with specially crafted relative file paths, enabling data to be written to unintended locations on the system’s file structure.

Are you from SOC/DFIR Teams? - Analyse Malware Files & Links with ANY.RUN Sandox -> Try for Free

Attackers leveraging this flaw may gain unauthorized write access to arbitrary file paths, potentially affecting the underlying system’s security, integrity, and stability.

According to developer Jason Gerlowski, this issue is being tracked as SOLR-17543 within the Apache Solr project.

Affected Versions

  • Apache Solr 6.6 through 9.7.0

The Apache Solr team has released version 9.8.0, which addresses and resolves this vulnerability. All users running affected versions are strongly urged to upgrade to the latest release as soon as possible.

The patched version ensures that potential malicious ZIP file uploads are properly sanitized to prevent exploitation.

For users unable to upgrade immediately, a mitigation strategy involves leveraging Solr’s Rule-Based Authentication Plugin.

By restricting access to the “configset upload” API to trusted administrators or users only, organizations can significantly limit the attack surface and reduce the risk of exploitation.

The vulnerability was discovered and reported by a security researcher credited under the alias “rry.”

Apache Solr continues to be a widely used and versatile search platform. Users are encouraged to remain vigilant, stay updated with patches, and implement best security practices to safeguard their systems from emerging threats.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Firefox Fixes High-Severity Vulnerability Causing Memory Corruption via Race Condition

Mozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow...

Tails 6.14.2 Released with Critical Fixes for Linux Kernel Vulnerabilities

The Tails Project has urgently released Tails 6.14.2, addressing critical security vulnerabilities in the Linux...

APT29 Hackers Use GRAPELOADER in New Attack Against European Diplomats

Check Point Research (CPR) has uncovered a new targeted phishing campaign employing GRAPELOADER, a...

Chinese Hackers Unleash New BRICKSTORM Malware to Target Windows and Linux Systems

A sophisticated cyber espionage campaign leveraging the newly identified BRICKSTORM malware variants has targeted...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Firefox Fixes High-Severity Vulnerability Causing Memory Corruption via Race Condition

Mozilla has released Firefox 137.0.2, addressing a high-severity security flaw that could potentially allow...

Tails 6.14.2 Released with Critical Fixes for Linux Kernel Vulnerabilities

The Tails Project has urgently released Tails 6.14.2, addressing critical security vulnerabilities in the Linux...

APT29 Hackers Use GRAPELOADER in New Attack Against European Diplomats

Check Point Research (CPR) has uncovered a new targeted phishing campaign employing GRAPELOADER, a...