DescriptionIn Apache Solr, the cluster can be partitioned into multiple collections and only a subset of nodes actually host any given collection. However, if a node receives a request for a collection it does not host, it proxies the request to a relevant node and serves the request. Solr bypasses all authorization settings for such requests. This affects all Solr versions prior to 7.7 that use the default authorization mechanism of Solr (RuleBasedAuthorizationPlugin).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lucene-solr (PTS)jessie3.6.2+dfsg-5+deb8u2fixed
jessie (security)3.6.2+dfsg-5+deb8u3fixed
stretch (security), stretch3.6.2+dfsg-10+deb9u2fixed
bullseye, sid3.6.2+dfsg-22fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lucene-solrsource(unstable)(not affected)


- lucene-solr <not-affected> (Vulnerable code is not present)
Issue introduced around: (4.2.0)
Fixed by: (releases/lucene-solr/6.6.6)

Search for package or bug name: Reporting problems