CVE-2017-3164

Severity
7.5HIGH
EPSS
59.5%
top 1.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 8
Latest updateMar 14

Description

Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to any reachable URL.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages3 packages

Mavenorg.apache.solr:solr-core1.307.7.0
NVDapache/solr1.3.07.6.0
CVEListV5apache_software_foundation/apache_solrApache Solr 1.3.0 to 1.4.1, 3.1.0 to 3.6.2, 4.0.0 to 4.10.4, 5.0.0 to 5.5.5, 6.0.0 to 6.6.5, 7.0.0 to 7.6.0

🔴Vulnerability Details

4
GHSA
Server-Side Request Forgery (SSRF) in org.apache.solr:solr-core2019-03-14
OSV
Server-Side Request Forgery (SSRF) in org.apache.solr:solr-core2019-03-14
OSV
CVE-2017-3164: Server Side Request Forgery in Apache Solr, versions 12019-03-08
CVEList
CVE-2017-3164: Server Side Request Forgery in Apache Solr, versions 12019-03-08

📋Vendor Advisories

1
Debian
CVE-2017-3164: lucene-solr - Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). ...2017

💬Community

2
Bugzilla
CVE-2017-3164 solr3: solr: SSRF in the shards parameter [fedora-all]2019-02-21
Bugzilla
CVE-2017-3164 solr: SSRF in the shards parameter2019-02-21
CVE-2017-3164 (HIGH CVSS 7.5) | Server Side Request Forgery in Apac | cvebase.io