CVE-2018-8026

Impact:
Moderate
Public Date:
2018-06-05
CWE:
CWE-611
Bugzilla:
1598621: CVE-2018-8026 solr: XML external entity expansion in config files allows for arbitrary file read

The MITRE CVE dictionary describes this issue as:

This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated files can be uploaded as configsets using Solr's API, allowing to exploit that vulnerability.

Find out more about CVE-2018-8026 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v3 metrics

NOTE: The following CVSS v3 metrics and score provided are preliminary and subject to review.

CVSS3 Base Score 6.5
CVSS3 Base Metrics CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector Network
Attack Complexity Low
Privileges Required Low
User Interaction None
Scope Unchanged
Confidentiality High
Integrity Impact None
Availability Impact None

Affected Packages State

Platform Package State
Red Hat Virtualization 4 eap7-lucene-solr Not affected
Red Hat JBoss Fuse Service Works 6 solr-core Not affected
Red Hat JBoss Fuse 7 camel-solr Not affected
Red Hat JBoss Fuse 6 solr-core Not affected
Red Hat JBoss EAP 6 solr-core Not affected
Red Hat JBoss Data Virtualization 6 solr-core Not affected
Red Hat JBoss Data Grid 6 solr-core Not affected

External References

Last Modified

CVE description copyright © 2017, The MITRE Corporation

Close

Welcome! Check out the Getting Started with Red Hat page for quick tours and guides for common tasks.