Description
Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to any reachable URL.
Published: 2019-03-08
Score: 7.5 High
EPSS: 59.5% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-vrh8-27q8-fr8f Server-Side Request Forgery (SSRF) in org.apache.solr:solr-core
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-09-16T19:52:10.132Z

Reserved: 2016-12-05T00:00:00.000Z

Link: CVE-2017-3164

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-03-08T21:29:00.250

Modified: 2024-11-21T03:24:57.700

Link: CVE-2017-3164

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses