UBUNTU-CVE-2023-50292

Source
https://ubuntu.com/security/CVE-2023-50292
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2023/UBUNTU-CVE-2023-50292.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2023-50292
Related
Published
2024-02-09T18:15:00Z
Modified
2024-02-09T18:15:00Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

Incorrect Permission Assignment for Critical Resource, Improper Control of Dynamically-Managed Code Resources vulnerability in Apache Solr. This issue affects Apache Solr: from 8.10.0 through 8.11.2, from 9.0.0 before 9.3.0. The Schema Designer was introduced to allow users to more easily configure and test new Schemas and configSets. However, when the feature was created, the "trust" (authentication) of these configSets was not considered. External library loading is only available to configSets that are "trusted" (created by authenticated users), thus non-authenticated users are unable to perform Remote Code Execution. Since the Schema Designer loaded configSets without taking their "trust" into account, configSets that were created by unauthenticated users were allowed to load external libraries when used in the Schema Designer. Users are recommended to upgrade to version 9.3.0, which fixes the issue.

References

Affected packages

Ubuntu:22.04:LTS / lucene-solr

Package

Name
lucene-solr
Purl
pkg:deb/ubuntu/lucene-solr?arch=src?distro=jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
3.6.2+dfsg-24

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "3.6.2+dfsg-24",
            "binary_name": "liblucene3-contrib-java"
        },
        {
            "binary_version": "3.6.2+dfsg-24",
            "binary_name": "liblucene3-java"
        }
    ]
}