The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.
The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.
Base Score: 7.5
Impact Score: 6.4
Exploitability Score: 10
Base Score: 9.8
Impact Score: 5.9
Exploitability Score: 3.9
|98929||Apache Solr 8.1.1 < 8.3.0 Remote Code Execution||Web Application Scanning||Component Vulnerability|
|132315||Apache Solr 8.1.1, 8.2.0 Remote JMX RMI Deserialization Vulnerability||Nessus||CGI abuses|
|131167||Apache Solr 8.1.1 / 8.2.0 Remote Code Execution Vulnerability||Nessus||CGI abuses|