Skip to content

Update solr.version #4095

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

renovate-bot
Copy link
Contributor

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
org.apache.solr:solr-analysis-extras (source) 9.4.1 -> 9.8.1 age adoption passing confidence
org.apache.solr:solr-core (source) 9.4.1 -> 9.8.0 age adoption passing confidence
org.apache.solr:solr-solrj (source) 9.4.1 -> 9.8.1 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2024-52012

Relative Path Traversal vulnerability in Apache Solr.

Solr instances running on Windows are vulnerable to arbitrary filepath write-access, due to a lack of input-sanitation in the "configset upload" API.  Commonly known as a "zipslip", maliciously constructed ZIP files can use relative filepaths to write data to unanticipated parts of the filesystem.  
This issue affects Apache Solr: from 6.6 through 9.7.0.

Users are recommended to upgrade to version 9.8.0, which fixes the issue.  Users unable to upgrade may also safely prevent the issue by using Solr's "Rule-Based Authentication Plugin" to restrict access to the configset upload API, so that it can only be accessed by a trusted set of administrators/users.

CVE-2025-24814

Core creation allows users to replace "trusted" configset files with arbitrary configuration

Solr instances that (1) use the "FileSystemConfigSetService" component (the default in "standalone" or "user-managed" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual "trusted" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem.  These replacement config files are treated as "trusted" and can use "" tags to add to Solr's classpath, which an attacker might use to load malicious code as a searchComponent or other plugin.

This issue affects all Apache Solr versions up through Solr 9.7.  Users can protect against the vulnerability by enabling authentication and authorization on their Solr clusters or switching to SolrCloud (and away from "FileSystemConfigSetService").  Users are also recommended to upgrade to Solr 9.8.0, which mitigates this issue by disabling use of "" tags by default.


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@forking-renovate forking-renovate bot added the dependencies A dependency upgrade label Apr 28, 2025
@renovate-bot renovate-bot force-pushed the renovate/solr.version branch 11 times, most recently from 182aa6f to 5b26fc4 Compare May 2, 2025 09:49
@renovate-bot renovate-bot force-pushed the renovate/solr.version branch 17 times, most recently from d72d3d1 to 932658b Compare May 12, 2025 08:41
@renovate-bot renovate-bot force-pushed the renovate/solr.version branch 9 times, most recently from 170b236 to 6eaa48b Compare May 14, 2025 09:28
@renovate-bot renovate-bot force-pushed the renovate/solr.version branch from 6eaa48b to 27f5f09 Compare May 14, 2025 16:42
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies A dependency upgrade
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants