CVE Vulnerabilities

CVE-2023-50291

Insufficiently Protected Credentials

Published: Feb 09, 2024 | Modified: Feb 15, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS 2.x
RedHat/V2
RedHat/V3
6.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Ubuntu
MEDIUM

Insufficiently Protected Credentials vulnerability in Apache Solr.

This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 before 9.3.0. One of the two endpoints that publishes the Solr process Java system properties, /admin/info/properties, was only setup to hide system properties that had password contained in the name. There are a number of sensitive system properties, such as basicauth and aws.secretKey do not contain password, thus their values were published via the /admin/info/properties endpoint. This endpoint populates the list of System Properties on the home screen of the Solr Admin page, making the exposed credentials visible in the UI.

This /admin/info/properties endpoint is protected under the config-read permission. Therefore, Solr Clouds with Authorization enabled will only be vulnerable through logged-in users that have the config-read permission. Users are recommended to upgrade to version 9.3.0 or 8.11.3, which fixes the issue. A single option now controls hiding Java system property for all endpoints, -Dsolr.hiddenSysProps. By default all known sensitive properties are hidden (including -Dbasicauth), as well as any property with a name containing secret or password.

Users who cannot upgrade can also use the following Java system property to fix the issue:   -Dsolr.redaction.system.pattern=.(password|secret|basicauth).

Weakness

The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval.

Affected Software

Name Vendor Start Version End Version
Solr Apache 6.0.0 (including) 8.11.3 (excluding)
Solr Apache 9.0.0 (including) 9.3.0 (excluding)
Lucene-solr Ubuntu bionic *
Lucene-solr Ubuntu mantic *
Lucene-solr Ubuntu trusty *
Lucene-solr Ubuntu xenial *

Potential Mitigations

References