From e529c329cf62bce2c564e29e786ead84927d930d Mon Sep 17 00:00:00 2001 From: MostInterestingBotInTheWorld <98333686+MostInterestingBotInTheWorld@users.noreply.github.com> Date: Tue, 17 May 2022 15:15:07 -0400 Subject: [PATCH] Enhancement: cves/2021/CVE-2021-27905.yaml by mp --- cves/2021/CVE-2021-27905.yaml | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/cves/2021/CVE-2021-27905.yaml b/cves/2021/CVE-2021-27905.yaml index 2c72126936..4298fe5121 100644 --- a/cves/2021/CVE-2021-27905.yaml +++ b/cves/2021/CVE-2021-27905.yaml @@ -4,7 +4,7 @@ info: name: Apache Solr <=8.8.1 - Server-Side Request Forgery author: hackergautam severity: critical - description: The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. + description: Apache Solr versions 8.8.1 and prior contain a server-side request forgery vulnerability. The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. remediation: This issue is resolved in Apache Solr 8.8.2 and later. reference: - https://www.anquanke.com/post/id/238201 @@ -46,4 +46,5 @@ requests: - 'OK' part: body + # Enhanced by mp on 2022/05/17