CVE-2018-8026

Severity
5.5MEDIUM
EPSS
4.3%
top 11.07%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJul 5
Latest updateOct 17

Description

This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to an XML external entity expansion (XXE) in Solr config files (currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext config file). In addition, Xinclude functionality provided in these config files is also affected in a similar way. The vulnerability can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network. The manipulated fi

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 1.8 | Impact: 3.6

Affected Packages3 packages

Mavenorg.apache.solr:solr-core7.0.07.4.0+1
NVDapache/solr7.0.07.3.1+1
CVEListV5apache_software_foundation/apache_solr6.0.0 to 6.6.4, 7.0.0 to 7.3.1+1

🔴Vulnerability Details

3
GHSA
XML external entity expansion in org.apache.solr:solr-core2018-10-17
OSV
XML external entity expansion in org.apache.solr:solr-core2018-10-17
CVEList
CVE-2018-8026: This vulnerability in Apache Solr 62018-07-05

📋Vendor Advisories

2
Red Hat
solr: XML external entity expansion in config files allows for arbitrary file read2018-06-05
Debian
CVE-2018-8026: lucene-solr - This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates to a...2018

💬Community

2
Bugzilla
CVE-2018-8026 solr: XML external entity expansion in config files allows for arbitrary file read2018-07-06
Bugzilla
CVE-2018-8026 solr3: solr: XML external entity expansion in config files allows for arbitrary file read [fedora-all]2018-07-06