This vulnerability in Apache Solr 1.2 to 6.6.2 and 7.0.0 to 7.2.1 relates to an XML external entity expansion (XXE) in the &dataConfig=<inlinexml> parameter of Solrs DataImportHandler. It can be used as XXE using file/ftp/http protocols in order to read arbitrary local files from the Solr server or the internal network.
The product processes an XML document that can contain XML entities with URIs that resolve to documents outside of the intended sphere of control, causing the product to embed incorrect documents into its output.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Solr | Apache | 1.2 (including) | 6.6.2 (including) |
| Solr | Apache | 7.0.0 (including) | 7.2.1 (including) |
| Lucene-solr | Ubuntu | artful | * |
| Lucene-solr | Ubuntu | bionic | * |
| Lucene-solr | Ubuntu | esm-apps/bionic | * |
| Lucene-solr | Ubuntu | esm-apps/xenial | * |
| Lucene-solr | Ubuntu | esm-infra-legacy/trusty | * |
| Lucene-solr | Ubuntu | trusty | * |
| Lucene-solr | Ubuntu | trusty/esm | * |
| Lucene-solr | Ubuntu | upstream | * |
| Lucene-solr | Ubuntu | xenial | * |