René Helmke 7791f18b51 bootstrap
2023-05-16 16:09:41 +02:00

106 lines
3.5 KiB
JSON

{
"id": "CVE-2018-11802",
"sourceIdentifier": "security@apache.org",
"published": "2020-04-01T22:15:15.147",
"lastModified": "2020-04-03T19:48:21.807",
"vulnStatus": "Analyzed",
"descriptions": [
{
"lang": "en",
"value": "In Apache Solr, the cluster can be partitioned into multiple collections and only a subset of nodes actually host any given collection. However, if a node receives a request for a collection it does not host, it proxies the request to a relevant node and serves the request. Solr bypasses all authorization settings for such requests. This affects all Solr versions prior to 7.7 that use the default authorization mechanism of Solr (RuleBasedAuthorizationPlugin)."
},
{
"lang": "es",
"value": "En Apache Solr, el cl\u00faster puede ser particionado en varias colecciones y solo un subconjunto de nodos realmente aloja una colecci\u00f3n determinada. Sin embargo, si un nodo recibe una petici\u00f3n de una colecci\u00f3n que no aloja, env\u00eda la petici\u00f3n hacia un nodo relevante y sirve la petici\u00f3n. Solr omite todas las configuraciones de autorizaci\u00f3n para tales peticiones. Esto afecta a todas las versiones de Solr anteriores a 7.7 que usa el mecanismo de autorizaci\u00f3n predeterminado de Solr (RuleBasedAuthorizationPlugin)."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"baseSeverity": "MEDIUM"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N",
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.0
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-863"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*",
"versionEndExcluding": "7.7.0",
"matchCriteriaId": "BDA516D9-1167-4354-ADD3-2C1C6E418352"
}
]
}
]
}
],
"references": [
{
"url": "https://www.openwall.com/lists/oss-security/2019/04/24/1",
"source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}
]
}