Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.solr/solr
  4. ›
  5. CVE-2024-45216

CVE-2024-45216: Improper Authentication vulnerability in Apache Solr

October 16, 2024

Solr instances using the PKIAuthenticationPlugin, which is enabled by default when Solr Authentication is used, are vulnerable to Authentication bypass. A fake ending at the end of any Solr API URL path, will allow requests to skip Authentication while maintaining the API contract with the original URL Path. This fake ending looks like an unprotected API path, however it is stripped off internally after authentication but before API routing.

This issue affects Apache Solr: from 5.3.0 before 8.11.4, from 9.0.0 before 9.7.0.

Users are recommended to upgrade to version 9.7.0, or 8.11.4, which fix the issue.

References

  • github.com/advisories/GHSA-mjvf-4h88-6xm3
  • issues.apache.org/jira/browse/SOLR-17417
  • nvd.nist.gov/vuln/detail/CVE-2024-45216
  • solr.apache.org/security.html

Code Behaviors & Features

Detect and mitigate CVE-2024-45216 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 5.3.0 before 8.11.4, all versions starting from 9.0.0 before 9.7.0

Fixed versions

  • 8.11.4
  • 9.7.0

Solution

Upgrade to versions 8.11.4, 9.7.0 or above.

Impact 9.8 CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-287: Improper Authentication

Source file

maven/org.apache.solr/solr/CVE-2024-45216.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:15 +0000.