Loading HuntDB...

GHSA-c82r-qg3w-q5mv

GitHub Security Advisory

Apache Solr insecure inter-node communication

✓ GitHub Reviewed HIGH Has CVE

Advisory Details

Apache Solr uses a PKI based mechanism to secure inter-node communication when security is enabled. It is possible to create a specially crafted node name that does not exist as part of the cluster and point it to a malicious node. This can trick the nodes in cluster to believe that the malicious node is a member of the cluster. So, if Solr users have enabled BasicAuth authentication mechanism using the BasicAuthPlugin or if the user has implemented a custom Authentication plugin, which does not implement either "HttpClientInterceptorPlugin" or "HttpClientBuilderPlugin", his/her servers are vulnerable to this attack. Users who only use SSL without basic authentication or those who use Kerberos are not affected.

Affected Packages

Maven org.apache.solr:solr-core
Affected versions: 5.3.0 (fixed in 5.5.5)
Maven org.apache.solr:solr-core
Affected versions: 6.0.0 (fixed in 6.6.0)

Related CVEs

Key Information

GHSA ID
GHSA-c82r-qg3w-q5mv
Published
May 14, 2022 1:56 AM
Last Modified
November 8, 2022 11:09 PM
CVSS Score
7.5 /10
Primary Ecosystem
Maven
Primary Package
org.apache.solr:solr-core
GitHub Reviewed
✓ Yes

Dataset

Last updated: July 28, 2025 6:37 AM

Data from GitHub Advisory Database. This information is provided for research and educational purposes.