Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/lucene-solr@3.6.2%2Bdfsg-27?distro=trixie
purl pkg:deb/debian/lucene-solr@3.6.2%2Bdfsg-27?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (37)
Vulnerability Summary Aliases
VCID-1m9m-xudm-47hw Unrestricted upload of file with dangerous type in Apache Solr The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server. CVE-2019-12409
GHSA-2289-pqfq-6wx7
VCID-3f1v-ypty-mygx The (1) UpdateRequestHandler for XSLT or (2) XPathEntityProcessor in Apache Solr before 4.1 allows remote attackers to have an unspecified impact via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, different vectors than CVE-2013-6407. CVE-2012-6612
GHSA-6cpj-3g83-q2j4
VCID-3gq7-8e2z-yqcv Apache Solr: Unauthorized bypass of certain "predefined permission" rules in the RuleBasedAuthorizationPlugin Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule Based Authorization Plugin" are vulnerable to allowing unauthorized access to certain Solr APIs, due to insufficiently strict input validation in those components.  Only deployments that meet all of the following criteria are impacted by this vulnerability: * Use of Solr's "RuleBasedAuthorizationPlugin" * A RuleBasedAuthorizationPlugin config (see security.json) that specifies multiple "roles" * A RuleBasedAuthorizationPlugin permission list (see security.json) that uses one or more of the following pre-defined permission rules: "config-read", "config-edit", "schema-read", "metrics-read", or "security-read". * A RuleBasedAuthorizationPlugin permission list that doesn't define the "all" pre-defined permission * A networking setup that allows clients to make unfiltered network requests to Solr. (i.e. user-submitted HTTP/HTTPS requests reach Solr as-is, unmodified or restricted by any intervening proxy or gateway) Users can mitigate this vulnerability by ensuring that their RuleBasedAuthorizationPlugin configuration specifies the "all" pre-defined permission and associates the permission with an "admin" or other privileged role.  Users can also upgrade to a Solr version outside of the impacted range, such as the recently released Solr 9.10.1. CVE-2026-22022
GHSA-qr3p-2xj2-q7hq
VCID-3vmh-e7x6-3kf6 Incorrect Authorization in Apache Solr When using ConfigurableInternodeAuthHadoopPlugin for authentication, Apache Solr versions prior to 8.8.2 would forward/proxy distributed requests using server credentials instead of original client credentials. This would result in incorrect authorization resolution on the receiving hosts. CVE-2021-29943
GHSA-vf7p-j8x6-xvwp
VCID-418m-x1un-gufd Apache Solr: Insufficient file-access checking in standalone core-creation requests The "create core" API of Apache Solr 8.6 through 9.10.0 lacks sufficient input validation on some API parameters, which can cause Solr to check the existence of and attempt to read file-system paths that should be disallowed by Solr's "allowPaths" security setting https://https://solr.apache.org/guide/solr/latest/configuration-guide/configuring-solr-xml.html#the-solr-element .  These read-only accesses can allow users to create cores using unexpected configsets if any are accessible via the filesystem.  On Windows systems configured to allow UNC paths this can additionally cause disclosure of NTLM "user" hashes.  Solr deployments are subject to this vulnerability if they meet the following criteria: * Solr is running in its "standalone" mode. * Solr's "allowPath" setting is being used to restrict file access to certain directories. * Solr's "create core" API is exposed and accessible to untrusted users.  This can happen if Solr's RuleBasedAuthorizationPlugin https://solr.apache.org/guide/solr/latest/deployment-guide/rule-based-authorization-plugin.html is disabled, or if it is enabled but the "core-admin-edit" predefined permission (or an equivalent custom permission) is given to low-trust (i.e. non-admin) user roles. Users can mitigate this by enabling Solr's RuleBasedAuthorizationPlugin (if disabled) and configuring a permission-list that prevents untrusted users from creating new Solr cores.  Users should also upgrade to Apache Solr 9.10.1 or greater, which contain fixes for this issue. CVE-2026-22444
GHSA-vc2w-4v3p-2mqw
VCID-49bu-dy1u-2fb9 Improper Neutralization of Input During Web Page Generation in Apache Solr Cross-site scripting (XSS) vulnerability in the Admin UI Plugin / Stats page in Apache Solr 4.x before 4.10.3 allows remote attackers to inject arbitrary web script or HTML via the fieldvaluecache object. CVE-2014-3628
GHSA-wgw2-gw4v-9w4j
VCID-4dgs-1mk2-5ubr Improper Input Validation Reported in SOLR-14515 (private) and fixed in SOLR-14561 (public), released in Solr version 8.6.0. The Replication handler allows commands backup, restore and deleteBackup. Each of these take a location parameter, which was not validated, i.e you could read/write to any location the solr user can access. CVE-2020-13941
GHSA-2467-h365-j7hm
VCID-5esr-zs91-zbb5 Improper Neutralization of Input During Web Page Generation in Apache Solr Multiple cross-site scripting (XSS) vulnerabilities in the Admin UI in Apache Solr before 5.1 allow remote attackers to inject arbitrary web script or HTML via crafted fields that are mishandled during the rendering of the (1) Analysis page, related to webapp/web/js/scripts/analysis.js or (2) Schema-Browser page, related to webapp/web/js/scripts/schema-browser.js. CVE-2015-8795
GHSA-mx2h-hf7j-2x3p
VCID-5tq3-rye7-nygg The UpdateRequestHandler for XML in Apache Solr before 4.1 allows remote attackers to have an unspecified impact via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. CVE-2013-6407
GHSA-998j-j6v9-5846
VCID-835p-mav1-1qem Incorrect Authorization in Apache Solr Apache Solr versions 6.6.0 to 6.6.6, 7.0.0 to 7.7.3 and 8.0.0 to 8.6.2 prevents some features considered dangerous (which could be used for remote code execution) to be configured in a ConfigSet that's uploaded via API without authentication/authorization. The checks in place to prevent such features can be circumvented by using a combination of UPLOAD/CREATE actions. This issue is patched in 8.6.3. CVE-2020-13957
GHSA-3c7p-vv5r-cmr5
VCID-9dma-s4ye-3ued Insecure Default Initialization of Resource vulnerability in Apache Solr New ConfigSets that are created via a Restore command, which copy a configSet from the backup and give it a new name, are created without setting the "trusted" metadata. ConfigSets that do not contain the flag are trusted implicitly if the metadata is missing, therefore this leads to "trusted" ConfigSets that may not have been created with an Authenticated request. "trusted" ConfigSets are able to load custom code into classloaders, therefore the flag is supposed to only be set when the request that uploads the ConfigSet is Authenticated & Authorized. This issue affects Apache Solr: from 6.6.0 before 8.11.4, from 9.0.0 before 9.7.0. This issue does not affect Solr instances that are secured via Authentication/Authorization. Users are primarily recommended to use Authentication and Authorization when running Solr. However, upgrading to version 9.7.0, or 8.11.4 will mitigate this issue otherwise. CVE-2024-45217
GHSA-h7w9-c5vx-x7j3
VCID-a4yf-9j54-e3cp Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') An Improper Input Validation vulnerability in DataImportHandler of Apache Solr allows an attacker to provide a Windows UNC path resulting in an SMB network call being made from the Solr host to another host on the network. If the attacker has wider access to the network, this may lead to SMB attacks, which may result in: * The exfiltration of sensitive data such as OS user hashes (NTLM/LM hashes), * In case of misconfigured systems, SMB Relay Attacks which can lead to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code Execution This issue affects all Apache Solr This issue only affects Windows. CVE-2021-44548
GHSA-pccr-q7v9-5f27
VCID-ftx3-494m-hbee Server-Side Request Forgery in Apache Solr The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2. CVE-2021-27905
GHSA-5phw-3jrp-3vj8
VCID-gfmc-r1h7-dfhs This vulnerability in Apache Solr 6.0.0 to 6.6.3, 7.0.0 to 7.3.0 relates to an XML external entity expansion (XXE) in Solr config files (solrconfig.xml, schema.xml, managed-schema). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. Users are advised to upgrade to either Solr 6.6.4 or Solr 7.3.1 releases both of which address the vulnerability. Once upgrade is complete, no other steps are required. Those releases only allow external entities and Xincludes that refer to local files / zookeeper resources below the Solr instance directory (using Solr's ResourceLoader); usage of absolute URLs is denied. Keep in mind, that external entities and XInclude are explicitly supported to better structure config files in large installations. Before Solr 6 this was no problem, as config files were not accessible through the APIs. CVE-2018-8010
GHSA-rc9v-h28f-jcmf
VCID-h9gm-dpgv-2yeh This vulnerability in Apache Solr 1.2 to 6.6.2 and 7.0.0 to 7.2.1 relates to an XML external entity expansion (XXE) in the `&dataConfig=<inlinexml>` parameter of Solr's DataImportHandler. It can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. CVE-2018-1308
GHSA-3pph-2595-cgfh
VCID-hpys-9ncu-3bgv Apache Solr: Backup/Restore APIs allow for deployment of executables in malicious ConfigSets Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of File with Dangerous Type, Inclusion of Functionality from Untrusted Control Sphere vulnerability in Apache Solr.This issue affects Apache Solr from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1. In the affected versions, Solr ConfigSets accepted Java jar and class files to be uploaded through the ConfigSets API. When backing up Solr Collections, these configSet files would be saved to disk when using the LocalFileSystemRepository (the default for backups). If the backup was saved to a directory that Solr uses in its ClassPath/ClassLoaders, then the jar and class files would be available to use with any ConfigSet, trusted or untrusted. When Solr is run in a secure way (Authorization enabled), as is strongly suggested, this vulnerability is limited to extending the Backup permissions with the ability to add libraries. Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the issue. In these versions, the following protections have been added: * Users are no longer able to upload files to a configSet that could be executed via a Java ClassLoader. * The Backup API restricts saving backups to directories that are used in the ClassLoader. CVE-2023-50386
GHSA-37vr-vmg4-jwpw
VCID-jc41-ky5q-tkhv Apache Solr can leak certain passwords due to System Property redaction logic inconsistencies Insufficiently Protected Credentials vulnerability in Apache Solr. This issue affects Apache Solr from 6.0.0 through 8.11.2, from 9.0.0 before 9.3.0. One of the two endpoints that publishes the Solr process' Java system properties, /admin/info/properties, was only setup to hide system properties that had "password" contained in the name. There are a number of sensitive system properties, such as "basicauth" and "aws.secretKey" do not contain "password", thus their values were published via the "/admin/info/properties" endpoint. This endpoint populates the list of System Properties on the home screen of the Solr Admin page, making the exposed credentials visible in the UI. This /admin/info/properties endpoint is protected under the "config-read" permission. Therefore, Solr Clouds with Authorization enabled will only be vulnerable through logged-in users that have the "config-read" permission. Users are recommended to upgrade to version 9.3.0 or 8.11.3, both of which fix the issue. A single option now controls hiding Java system property for all endpoints, "-Dsolr.hiddenSysProps". By default all known sensitive properties are hidden (including "-Dbasicauth"), as well as any property with a name containing "secret" or "password". Users who cannot upgrade can also use the following Java system property to fix the issue:   `-Dsolr.redaction.system.pattern=.*(password|secret|basicauth).*` CVE-2023-50291
GHSA-3hwc-rqwp-v36q
VCID-ke61-vddr-4udk When using the Index Replication feature, Apache Solr nodes can pull index files from a master/leader node using an HTTP API which accepts a file name. However, Solr before 5.5.4 and 6.x before 6.4.1 did not validate the file name, hence it was possible to craft a special request involving path traversal, leaving any file readable to the Solr server process exposed. Solr servers protected and restricted by firewall rules and/or authentication would not be at risk since only trusted clients and users would gain direct HTTP access. CVE-2017-3163
GHSA-387v-84cv-9qmc
VCID-keda-efkh-y3fg Apache Solr allows read access to host environmet variables Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr. The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance. Users are able to specify which environment variables to hide, however, the default list is designed to work for known secret Java system properties. Environment variables cannot be strictly defined in Solr, like Java system properties can be, and may be set for the entire host, unlike Java system properties which are set per-Java-proccess. The Solr Metrics API is protected by the "metrics-read" permission. Therefore, Solr Clouds with Authorization setup will only be vulnerable via users with the "metrics-read" permission. This issue affects Apache Solr: from 9.0.0 before 9.3.0. Users are recommended to upgrade to version 9.3.0 or later, in which environment variables are not published via the Metrics API. CVE-2023-50290
GHSA-gg7w-pw2r-x2cq
VCID-qkt3-eevh-ekcr Apache Solr Schema Designer blindly "trusts" all configsets Incorrect Permission Assignment for Critical Resource, Improper Control of Dynamically-Managed Code Resources vulnerability in Apache Solr. This issue affects Apache Solr from 8.10.0 through 8.11.2, from 9.0.0 before 9.3.0. The Schema Designer was introduced to allow users to more easily configure and test new Schemas and configSets. However, when the feature was created, the "trust" (authentication) of these configSets was not considered. External library loading is only available to configSets that are "trusted" (created by authenticated users), thus non-authenticated users are unable to perform Remote Code Execution. Since the Schema Designer loaded configSets without taking their "trust" into account, configSets that were created by unauthenticated users were allowed to load external libraries when used in the Schema Designer. Users are recommended to upgrade to version 9.3.0 or 8.11.3, both of which fix the issue. CVE-2023-50292
GHSA-4wxw-42wx-2wfx
VCID-r413-tvjg-mfh3 Apache Solr uses a PKI based mechanism to secure inter-node communication when security is enabled. It is possible to create a specially crafted node name that does not exist as part of the cluster and point it to a malicious node. This can trick the nodes in cluster to believe that the malicious node is a member of the cluster. So, if Solr users have enabled BasicAuth authentication mechanism using the BasicAuthPlugin or if the user has implemented a custom Authentication plugin, which does not implement either "HttpClientInterceptorPlugin" or "HttpClientBuilderPlugin", his/her servers are vulnerable to this attack. Users who only use SSL without basic authentication or those who use Kerberos are not affected. CVE-2017-7660
GHSA-c82r-qg3w-q5mv
VCID-r6fw-42tv-vueu Apache Solr Cross-site scripting Vulnerability Cross-site scripting (XSS) vulnerability in `webapp/web/js/scripts/schema-browser.js` in the Admin UI in Apache Solr before 5.3 allows remote attackers to inject arbitrary web script or HTML via a crafted schema-browse URL. CVE-2015-8796
GHSA-4fxw-g29w-r8mx
VCID-rym5-bjyc-nybu The DocumentAnalysisRequestHandler in Apache Solr before 4.3.1 does not properly use the EmptyEntityResolver, which allows remote attackers to have an unspecified impact via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-6407. CVE-2013-6408
GHSA-45w3-2hvv-pfxq
VCID-rys3-pnnk-a7e4 Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr. CVE-2017-12629
GHSA-mh7g-99w9-xpjm
VCID-t4p6-84y8-kbbu Apache Solr's Streaming Expressions allow users to extract data from other Solr Clouds Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr. This issue affects Apache Solr from 6.0.0 through 8.11.2, from 9.0.0 before 9.4.1. Solr Streaming Expressions allows users to extract data from other Solr Clouds, using a "zkHost" parameter. When original SolrCloud is setup to use ZooKeeper credentials and ACLs, they will be sent to whatever "zkHost" the user provides. An attacker could setup a server to mock ZooKeeper, that accepts ZooKeeper requests with credentials and ACLs and extracts the sensitive information, then send a streaming expression using the mock server's address in "zkHost". Streaming Expressions are exposed via the "/streaming" handler, with "read" permissions. Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the issue. From these versions on, only zkHost values that have the same server address (regardless of chroot), will use the given ZooKeeper credentials and ACLs when connecting. CVE-2023-50298
GHSA-xrj7-x7gp-wwqr
VCID-tt7h-4geu-5bc9 XML External Entity (XXE) Injection in Apache Solr In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true. CVE-2019-0193
GHSA-3gm7-v7vw-866c
VCID-uaxq-nmwp-5uct Apache Solr Relative Path Traversal vulnerability Relative Path Traversal vulnerability in Apache Solr. Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the "configset upload" API.  Commonly known as a "zipslip", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.   This issue affects Apache Solr: from 6.6 through 9.7.0. Users are recommended to upgrade to version 9.8.0, which fixes the issue.  Users unable to upgrade may also safely prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users. CVE-2024-52012
GHSA-4p5m-gvpf-f3x5
VCID-v5ka-6bd4-33ft Apache Solr vulnerable to Execution with Unnecessary Privileges Core creation allows users to replace "trusted" configset files with arbitrary configuration Solr instances that (1) use the "FileSystemConfigSetService" component (the default in "standalone" or "user-managed" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual "trusted" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem.  These replacement config files are treated as "trusted" and can use "<lib>" tags to add to Solr's classpath, which an attacker might use to load malicious code as a searchComponent or other plugin. This issue affects all Apache Solr versions up through Solr 9.7.  Users can protect against the vulnerability by enabling authentication and authorization on their Solr clusters or switching to SolrCloud (and away from "FileSystemConfigSetService").  Users are also recommended to upgrade to Solr 9.8.0, which mitigates this issue by disabling use of "<lib>" tags by default. CVE-2025-24814
GHSA-68r2-fwcg-qpm8
VCID-vkyg-mj2g-bqgp This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated files can be uploaded as configsets using Solr's API, allowing to exploit that vulnerability. CVE-2018-8026
GHSA-7px3-6f6g-hxcj
VCID-vrdm-7wfj-qbht Improper Authentication vulnerability in Apache Solr Solr instances using the PKIAuthenticationPlugin, which is enabled by default when Solr Authentication is used, are vulnerable to Authentication bypass. A fake ending at the end of any Solr API URL path, will allow requests to skip Authentication while maintaining the API contract with the original URL Path. This fake ending looks like an unprotected API path, however it is stripped off internally after authentication but before API routing. This issue affects Apache Solr: from 5.3.0 before 8.11.4, from 9.0.0 before 9.7.0. Users are recommended to upgrade to version 9.7.0, or 8.11.4, which fix the issue. CVE-2024-45216
GHSA-mjvf-4h88-6xm3
VCID-vsgv-kss4-nqcb Incorrect Authorization in Apache Solr In Apache Solr, the cluster can be partitioned into multiple collections and only a subset of nodes actually host any given collection. However, if a node receives a request for a collection it does not host, it proxies the request to a relevant node and serves the request. Solr bypasses all authorization settings for such requests. This affects all Solr versions prior to 6.6.6 and 7.7 that use the default authorization mechanism of Solr (RuleBasedAuthorizationPlugin). CVE-2018-11802
GHSA-j346-h5wc-rw2m
VCID-vvt2-qyef-3fa6 Improper Neutralization of Input During Web Page Generation in Apache Solr Cross-site scripting (XSS) vulnerability in webapp/web/js/scripts/plugins.js in the stats page in the Admin UI in Apache Solr before 5.3.1 allows remote attackers to inject arbitrary web script or HTML via the entry parameter to a plugins/cache URI. CVE-2015-8797
GHSA-v6gf-x8fp-532v
VCID-wke8-9ysk-akc2 Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries. CVE-2013-6397
GHSA-j8qw-mwmv-28cg
VCID-xypj-xu8p-gkbs Apache Solr's Kerberos plugin can be configured to use delegation tokens, which allows an application to reuse the authentication of an end-user or another application. There are two issues with this functionality (when using SecurityAwareZkACLProvider type of ACL provider e.g. SaslZkACLProvider). Firstly, access to the security configuration can be leaked to users other than the solr super user. Secondly, malicious users can exploit this leaked configuration for privilege escalation to further expose/modify private data and/or disrupt operations in the Solr cluster. The vulnerability is fixed from Apache Solr 6.6.1 onwards. CVE-2017-9803
GHSA-f553-j2gv-g5r9
VCID-z2u5-9szx-vyax Deserialization of Untrusted Data In Apache Solr versions, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side. CVE-2019-0192
GHSA-xhcq-fv7x-grr2
VCID-zfk3-8kt1-gbbw Apache Solr vulnerable to XML Bomb Solr versions prior to 5.0.0 are vulnerable to an XML resource consumption attack (a.k.a. Lol Bomb) via it?s update handler.?By leveraging XML DOCTYPE and ENTITY type elements, the attacker can create a pattern that will expand when the server parses the XML causing OOMs. CVE-2019-12401
GHSA-jq2w-w7v2-69q5
VCID-zrn1-s7ht-pbdt Improper permission handling in Apache Solr When starting Apache Solr versions prior to 8.8.2, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be readable. Additionally, with any ZkACLProvider, if the security.json is already present, Solr will not automatically update the ACLs. CVE-2021-29262
GHSA-jgcr-fg3g-qvw8

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:30:09.353408+00:00 Debian Importer Fixing VCID-uaxq-nmwp-5uct https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:27:09.230884+00:00 Debian Importer Fixing VCID-vrdm-7wfj-qbht https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:24:41.278990+00:00 Debian Importer Fixing VCID-vsgv-kss4-nqcb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:19:04.530046+00:00 Debian Importer Fixing VCID-4dgs-1mk2-5ubr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T13:10:53.342977+00:00 Debian Importer Fixing VCID-3vmh-e7x6-3kf6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:49:24.469051+00:00 Debian Importer Fixing VCID-ke61-vddr-4udk https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:47:11.526037+00:00 Debian Importer Fixing VCID-ftx3-494m-hbee https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:43:24.496689+00:00 Debian Importer Fixing VCID-jc41-ky5q-tkhv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:38:50.036065+00:00 Debian Importer Fixing VCID-v5ka-6bd4-33ft https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:28:10.906780+00:00 Debian Importer Fixing VCID-a4yf-9j54-e3cp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:00:38.563260+00:00 Debian Importer Fixing VCID-9dma-s4ye-3ued https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:55:10.092839+00:00 Debian Importer Fixing VCID-5esr-zs91-zbb5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:53:47.741950+00:00 Debian Importer Fixing VCID-1m9m-xudm-47hw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:49:04.149674+00:00 Debian Importer Fixing VCID-wke8-9ysk-akc2 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:42:24.086993+00:00 Debian Importer Fixing VCID-vkyg-mj2g-bqgp https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:41:14.538495+00:00 Debian Importer Fixing VCID-zfk3-8kt1-gbbw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:35:19.292631+00:00 Debian Importer Fixing VCID-rym5-bjyc-nybu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:31:54.599962+00:00 Debian Importer Fixing VCID-r413-tvjg-mfh3 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:31:21.641924+00:00 Debian Importer Fixing VCID-835p-mav1-1qem https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:29:58.231895+00:00 Debian Importer Fixing VCID-3gq7-8e2z-yqcv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:23:47.334033+00:00 Debian Importer Fixing VCID-418m-x1un-gufd https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:09:04.347882+00:00 Debian Importer Fixing VCID-gfmc-r1h7-dfhs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:05:43.392033+00:00 Debian Importer Fixing VCID-zrn1-s7ht-pbdt https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:03:03.621152+00:00 Debian Importer Fixing VCID-h9gm-dpgv-2yeh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:02:42.878837+00:00 Debian Importer Fixing VCID-r6fw-42tv-vueu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:49:36.204360+00:00 Debian Importer Fixing VCID-qkt3-eevh-ekcr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:25:31.511108+00:00 Debian Importer Fixing VCID-vvt2-qyef-3fa6 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:19:07.492469+00:00 Debian Importer Fixing VCID-z2u5-9szx-vyax https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:17:13.813491+00:00 Debian Importer Fixing VCID-hpys-9ncu-3bgv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:15:38.042324+00:00 Debian Importer Fixing VCID-5tq3-rye7-nygg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:53:10.418494+00:00 Debian Importer Fixing VCID-3f1v-ypty-mygx https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:28.665043+00:00 Debian Importer Fixing VCID-keda-efkh-y3fg https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:41:15.825112+00:00 Debian Importer Fixing VCID-xypj-xu8p-gkbs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:32:16.020072+00:00 Debian Importer Fixing VCID-rys3-pnnk-a7e4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:24:14.813865+00:00 Debian Importer Fixing VCID-tt7h-4geu-5bc9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:57:14.191014+00:00 Debian Importer Fixing VCID-t4p6-84y8-kbbu https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T08:38:52.917577+00:00 Debian Importer Fixing VCID-49bu-dy1u-2fb9 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:19:06.334748+00:00 Debian Importer Fixing VCID-uaxq-nmwp-5uct https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:16:55.260064+00:00 Debian Importer Fixing VCID-vrdm-7wfj-qbht https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:15:02.952745+00:00 Debian Importer Fixing VCID-vsgv-kss4-nqcb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:10:35.547320+00:00 Debian Importer Fixing VCID-4dgs-1mk2-5ubr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T09:04:11.090336+00:00 Debian Importer Fixing VCID-3vmh-e7x6-3kf6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:47:56.066005+00:00 Debian Importer Fixing VCID-ke61-vddr-4udk https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:46:13.511518+00:00 Debian Importer Fixing VCID-ftx3-494m-hbee https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:43:25.933145+00:00 Debian Importer Fixing VCID-jc41-ky5q-tkhv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:40:00.061015+00:00 Debian Importer Fixing VCID-v5ka-6bd4-33ft https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:32:11.568472+00:00 Debian Importer Fixing VCID-a4yf-9j54-e3cp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:12:09.600175+00:00 Debian Importer Fixing VCID-9dma-s4ye-3ued https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:08.322312+00:00 Debian Importer Fixing VCID-5esr-zs91-zbb5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:07:15.958830+00:00 Debian Importer Fixing VCID-1m9m-xudm-47hw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:03:47.481203+00:00 Debian Importer Fixing VCID-wke8-9ysk-akc2 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:58:41.346824+00:00 Debian Importer Fixing VCID-vkyg-mj2g-bqgp https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:57:48.478361+00:00 Debian Importer Fixing VCID-zfk3-8kt1-gbbw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:03.672954+00:00 Debian Importer Fixing VCID-rym5-bjyc-nybu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:51:36.148462+00:00 Debian Importer Fixing VCID-r413-tvjg-mfh3 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:51:14.531114+00:00 Debian Importer Fixing VCID-835p-mav1-1qem https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:50:14.393646+00:00 Debian Importer Fixing VCID-3gq7-8e2z-yqcv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:45:42.562499+00:00 Debian Importer Fixing VCID-418m-x1un-gufd https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:34:37.259667+00:00 Debian Importer Fixing VCID-gfmc-r1h7-dfhs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:32:07.220844+00:00 Debian Importer Fixing VCID-zrn1-s7ht-pbdt https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:30:12.908433+00:00 Debian Importer Fixing VCID-h9gm-dpgv-2yeh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:29:56.435150+00:00 Debian Importer Fixing VCID-r6fw-42tv-vueu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:19:45.623985+00:00 Debian Importer Fixing VCID-qkt3-eevh-ekcr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:01:52.666842+00:00 Debian Importer Fixing VCID-vvt2-qyef-3fa6 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:56:44.102884+00:00 Debian Importer Fixing VCID-z2u5-9szx-vyax https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:55:16.983240+00:00 Debian Importer Fixing VCID-hpys-9ncu-3bgv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:54:06.043936+00:00 Debian Importer Fixing VCID-5tq3-rye7-nygg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:36:47.045768+00:00 Debian Importer Fixing VCID-3f1v-ypty-mygx https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:46.018527+00:00 Debian Importer Fixing VCID-keda-efkh-y3fg https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:26:36.863354+00:00 Debian Importer Fixing VCID-xypj-xu8p-gkbs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:21:32.367310+00:00 Debian Importer Fixing VCID-rys3-pnnk-a7e4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:16:36.749146+00:00 Debian Importer Fixing VCID-tt7h-4geu-5bc9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:00:30.782653+00:00 Debian Importer Fixing VCID-t4p6-84y8-kbbu https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T17:48:53.027938+00:00 Debian Importer Fixing VCID-49bu-dy1u-2fb9 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:45:23.912883+00:00 Debian Importer Fixing VCID-418m-x1un-gufd https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.878511+00:00 Debian Importer Fixing VCID-3gq7-8e2z-yqcv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.843890+00:00 Debian Importer Fixing VCID-v5ka-6bd4-33ft https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.809687+00:00 Debian Importer Fixing VCID-uaxq-nmwp-5uct https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.775134+00:00 Debian Importer Fixing VCID-9dma-s4ye-3ued https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.739107+00:00 Debian Importer Fixing VCID-vrdm-7wfj-qbht https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.704424+00:00 Debian Importer Fixing VCID-hpys-9ncu-3bgv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.669672+00:00 Debian Importer Fixing VCID-t4p6-84y8-kbbu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.635425+00:00 Debian Importer Fixing VCID-qkt3-eevh-ekcr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.601233+00:00 Debian Importer Fixing VCID-jc41-ky5q-tkhv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.566169+00:00 Debian Importer Fixing VCID-keda-efkh-y3fg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.531588+00:00 Debian Importer Fixing VCID-a4yf-9j54-e3cp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.496735+00:00 Debian Importer Fixing VCID-3vmh-e7x6-3kf6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.462209+00:00 Debian Importer Fixing VCID-zrn1-s7ht-pbdt https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.427703+00:00 Debian Importer Fixing VCID-ftx3-494m-hbee https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.374477+00:00 Debian Importer Fixing VCID-835p-mav1-1qem https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.339358+00:00 Debian Importer Fixing VCID-4dgs-1mk2-5ubr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.295414+00:00 Debian Importer Fixing VCID-1m9m-xudm-47hw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.261215+00:00 Debian Importer Fixing VCID-zfk3-8kt1-gbbw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.226533+00:00 Debian Importer Fixing VCID-tt7h-4geu-5bc9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.190386+00:00 Debian Importer Fixing VCID-z2u5-9szx-vyax https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.155460+00:00 Debian Importer Fixing VCID-vkyg-mj2g-bqgp https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.120812+00:00 Debian Importer Fixing VCID-gfmc-r1h7-dfhs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.086327+00:00 Debian Importer Fixing VCID-h9gm-dpgv-2yeh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.044029+00:00 Debian Importer Fixing VCID-vsgv-kss4-nqcb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:23.009638+00:00 Debian Importer Fixing VCID-xypj-xu8p-gkbs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.974841+00:00 Debian Importer Fixing VCID-r413-tvjg-mfh3 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.927337+00:00 Debian Importer Fixing VCID-ke61-vddr-4udk https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.885975+00:00 Debian Importer Fixing VCID-rys3-pnnk-a7e4 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.850329+00:00 Debian Importer Fixing VCID-vvt2-qyef-3fa6 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.815706+00:00 Debian Importer Fixing VCID-r6fw-42tv-vueu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.781272+00:00 Debian Importer Fixing VCID-5esr-zs91-zbb5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.746809+00:00 Debian Importer Fixing VCID-49bu-dy1u-2fb9 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.711383+00:00 Debian Importer Fixing VCID-rym5-bjyc-nybu https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.670962+00:00 Debian Importer Fixing VCID-5tq3-rye7-nygg https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.631091+00:00 Debian Importer Fixing VCID-wke8-9ysk-akc2 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:45:22.591479+00:00 Debian Importer Fixing VCID-3f1v-ypty-mygx https://security-tracker.debian.org/tracker/data/json 38.1.0