Apache Solr 5.3.x 'XMLResponseParser.java' XXE

high Nessus Network Monitor Plugin ID 9072

Synopsis

The remote web server contains a Java application that is affected by an XXE injection vulnerability.

Description

Versions of Apache Solr 5.3.x are affected by an XXE (Xml eXternal Entity) injection flaw that is triggered during the parsing of XML data passed via the 'stream.body' parameter in 'XMLResponseParser.java'. The issue is due to an incorrectly configured XML parser accepting XML external entities from an untrusted source. By sending specially crafted XML data, a remote attacker can have an unspecified impact.

Solution

Upgrade to Solr 5.4.0 or later.

See Also

http://lucene.apache.org/solr/5_4_0/changes

https://issues.apache.org/jira/browse/SOLR-8307

Plugin Details

Severity: High

ID: 9072

Family: CGI

Published: 2/5/2016

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: High

Base Score: 8.5

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:C

CVSS v3

Risk Factor: High

Base Score: 8.2

Temporal Score: 7.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H

Temporal Vector: CVSS:3.0/E:X/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:solr

Patch Publication Date: 1/23/2016

Vulnerability Publication Date: 11/17/2015