Threat Encyclopedia



This indicates an attack attempt to exploit a Code Injection Vulnerability in Apache Solr.
The vulnerability is due to missing authentication mechanisms in the ConfigSet CREATE API. A remote unauthenticated attacker can exploit this vulnerability by sending crafted requests to the target server. Successful exploitation can result in arbitrary code execution in the context of the Apache Solr service.

affected-products-logoAffected Products

Apache Software Foundation Solr 6.6.0 to 6.6.6
Apache Software Foundation Solr 7.0.0 to 7.7.3
Apache Software Foundation Solr 8.0.0 to 8.6.2


System Compromise: Remote attackers can gain control of vulnerable systems.

CVE References