Apache Solr uses a PKI based mechanism to secure inter-node communication when security is enabled. It is possible to create a specially crafted node name that does not exist as part of the cluster and point it to a malicious node. This can trick the nodes in cluster to believe that the malicious node is a member of the cluster. So, if Solr users have enabled BasicAuth authentication mechanism using the BasicAuthPlugin or if the user has implemented a custom Authentication plugin, which does not implement either "HttpClientInterceptorPlugin" or "HttpClientBuilderPlugin", his/her servers are vulnerable to this attack. Users who only use SSL without basic authentication or those who use Kerberos are not affected.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2024-09-16T18:13:03.269Z

Reserved: 2017-04-11T00:00:00

Link: CVE-2017-7660

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-07-07T19:29:00.197

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-7660

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-07-07T00:00:00Z

Links: CVE-2017-7660 - Bugzilla

cve-icon OpenCVE Enrichment

No data.