CVE-2017-12629

Source
https://cve.org/CVERecord?id=CVE-2017-12629
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-12629.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2017-12629
Aliases
Downstream
Related
Published
2017-10-14T23:29:00.260Z
Modified
2026-02-22T01:05:26.181658Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr.

References

Affected packages

Git / github.com/apache/lucene-solr

Affected ranges

Type
GIT
Repo
https://github.com/apache/lucene-solr
Events

Affected versions

releases/lucene-solr/5.*
releases/lucene-solr/5.5.0
releases/lucene-solr/5.5.1
releases/lucene-solr/5.5.2
releases/lucene-solr/5.5.3
releases/lucene-solr/5.5.4
releases/lucene-solr/7.*
releases/lucene-solr/7.0.0

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-12629.json"

Git / github.com/wordpress/wordpress

Affected ranges

Type
GIT
Repo
https://github.com/wordpress/wordpress
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected
Introduced
0 Unknown introduced commit / All previous commits are affected
Last affected

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2017-12629.json"