Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-50290

Severity
6.5MEDIUM
EPSS
92.9%
top 0.23%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJan 15

Description

Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr. The Solr Metrics API publishes all unprotected environment variables available to each Apache Solr instance. Users are able to specify which environment variables to hide, however, the default list is designed to work for known secret Java system properties. Environment variables cannot be strictly defined in Solr, like Java system properties can be, and may be set for the entire host, unlike Java system pro

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages3 packages

NVDapache/solr9.0.09.3.0
Mavenorg.apache.solr:solr-core9.0.09.3.0
CVEListV5apache_software_foundation/apache_solr9.0.09.3.0

🔴Vulnerability Details

4
OSV
CVE-2023-50290: Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apache Solr2024-01-15
GHSA
Apache Solr allows read access to host environmet variables2024-01-15
OSV
Apache Solr allows read access to host environmet variables2024-01-15
CVEList
Apache Solr: Host environment variables are published via the Metrics API2024-01-15

💥Exploits & PoCs

1
Nuclei
Apache Solr - Host Environment Variables Leak via Metrics API

📋Vendor Advisories

2
Red Hat
Solr: Host environment variables are published via the Metrics API2024-01-12
Debian
CVE-2023-50290: lucene-solr - Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Apac...2023
CVE-2023-50290 (MEDIUM CVSS 6.5) | Exposure of Sensitive Information t | cvebase.io