This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/solr-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new d7ce3b9a6 Commit build products
d7ce3b9a6 is described below

commit d7ce3b9a6e30af4a7e5ea68ee15e2b8812350d4e
Author: Build Pelican (action) <[email protected]>
AuthorDate: Sun Jan 26 12:48:35 2025 +0000

    Commit build products
---
 output/feeds/all.atom.xml           |  84 ++++++++++++++++-----------
 output/feeds/solr/security.atom.xml |  50 ++++++++++++++++-
 output/index.html                   |   2 +-
 output/news.html                    |  40 +++++++++++++
 output/operator/index.html          |   2 +-
 output/security.html                | 109 +++++++++++++++++-------------------
 6 files changed, 193 insertions(+), 94 deletions(-)

diff --git a/output/feeds/all.atom.xml b/output/feeds/all.atom.xml
index a72aba076..f49195454 100644
--- a/output/feeds/all.atom.xml
+++ b/output/feeds/all.atom.xml
@@ -1,5 +1,53 @@
 <?xml version="1.0" encoding="utf-8"?>
-<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr</title><link 
href="/" rel="alternate"></link><link href="/feeds/all.atom.xml" 
rel="self"></link><id>/</id><updated>2025-01-23T00:00:00+00:00</updated><entry><title>Apache
 Solr™ 9.8.0 available</title><link href="/apache-solrtm-980-available.html" 
rel="alternate"></link><published>2025-01-23T00:00:00+00:00</published><updated>2025-01-23T00:00:00+00:00</updated><author><name>Solr
 Developers</name></author><id>tag:None,2025-01-23: [...]
+<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr</title><link 
href="/" rel="alternate"></link><link href="/feeds/all.atom.xml" 
rel="self"></link><id>/</id><updated>2025-01-26T00:00:00+00:00</updated><entry><title>CVE-2024-52012:
 Apache Solr: Configset upload on Windows allows arbitrary path 
write-access</title><link 
href="/cve-2024-52012-apache-solr-configset-upload-on-windows-allows-arbitrary-path-write-access.html"
 rel="alternate"></link><published>2025-01-26T00:00:00+00:00 [...]
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.6 through 9.7.0&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Relative Path Traversal vulnerability in Apache Solr.&lt;/p&gt;
+&lt;p&gt;Solr instances running on Windows are vulnerable to arbitrary 
filepath write-access, due to a lack of input-sanitation in the "configset 
upload" API.  Commonly known as a "zipslip", maliciously constructed ZIP 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.6 through 9.7.0&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Relative Path Traversal vulnerability in Apache Solr.&lt;/p&gt;
+&lt;p&gt;Solr instances running on Windows are vulnerable to arbitrary 
filepath write-access, due to a lack of input-sanitation in the "configset 
upload" API.  Commonly known as a "zipslip", maliciously constructed ZIP files 
can use relative filepaths to write data to unanticipated parts of the 
filesystem.&lt;br&gt;
+This issue affects Apache Solr: from 6.6 through 9.7.0.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Users are recommended to upgrade to version 9.8.0, which fixes the 
issue.  Users unable to upgrade may also safely prevent the issue by using 
Solr's "Rule-Based Authentication Plugin" to restrict access to the configset 
upload API, so that it can only be accessed by a trusted set of 
administrators/users.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit&lt;/strong&gt;
+rry (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-17543"&gt;SOLR-17543&lt;/a&gt;
+CVE - &lt;a 
href="https://www.cve.org/CVERecord?id=CVE-2024-52012"&gt;CVE-2024-52012&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>CVE-2025-24814: Apache 
Solr: Core-creation with "trusted" configset can use arbitrary untrusted 
files</title><link 
href="/cve-2025-24814-apache-solr-core-creation-with-trusted-configset-can-use-arbitrary-untrusted-files.html"
 
rel="alternate"></link><published>2025-01-26T00:00:00+00:00</published><updated>2025-01-
 [...]
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr through 9.7&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Core creation allows users to replace "trusted" configset files with 
arbitrary configuration&lt;/p&gt;
+&lt;p&gt;Solr instances that (1) use the "FileSystemConfigSetService" 
component (the default in "standalone" or "user-managed" mode), and (2) are 
running without authentication and authorization are vulnerable to a sort 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr through 9.7&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Core creation allows users to replace "trusted" configset files with 
arbitrary configuration&lt;/p&gt;
+&lt;p&gt;Solr instances that (1) use the "FileSystemConfigSetService" 
component (the default in "standalone" or "user-managed" mode), and (2) are 
running without authentication and authorization are vulnerable to a sort of 
privilege escalation wherein individual "trusted" configset files can be 
ignored in favor of potentially-untrusted replacements available elsewhere on 
the filesystem.  These replacement config files are treated as "trusted" and 
can use "&lt;lib&gt;" tags to add to Solr [...]
+&lt;p&gt;This issue affects all Apache Solr versions up through Solr 
9.7.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Users can protect against the vulnerability by enabling 
authentication and authorization on their Solr clusters or switching to 
SolrCloud (and away from "FileSystemConfigSetService").  Users are also 
recommended to upgrade to Solr 9.8.0, which mitigates this issue by disabling 
use of "&lt;lib&gt;" tags by default.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit&lt;/strong&gt;
+pwn null (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-16781"&gt;SOLR-16781&lt;/a&gt;
+CVE - &lt;a 
href="https://www.cve.org/CVERecord?id=CVE-2025-24814"&gt;CVE-2025-24814&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>Apache Solr™ 9.8.0 
available</title><link href="/apache-solrtm-980-available.html" 
rel="alternate"></link><published>2025-01-23T00:00:00+00:00</published><updated>2025-01-23T00:00:00+00:00</updated><author><name>Solr
 
Developers</name></author><id>tag:None,2025-01-23:/apache-solrtm-980-available.html</id><summary
  [...]
 &lt;p&gt;Solr is the blazing-fast, open source, multi-modal search platform 
built on Apache Lucene. It powers full-text, vector, analytics, and geospatial 
search at many of the world's largest organizations. Other major features 
include Kubernetes and docker …&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;The Solr PMC is pleased to announce the release of Apache 
Solr 9.8.0.&lt;/p&gt;
 &lt;p&gt;Solr is the blazing-fast, open source, multi-modal search platform 
built on Apache Lucene. It powers full-text, vector, analytics, and geospatial 
search at many of the world's largest organizations. Other major features 
include Kubernetes and docker integration, streaming, highlighting, faceting, 
and spellchecking.&lt;/p&gt;
 &lt;p&gt;Solr 9.8.0 is available for immediate download at:&lt;/p&gt;
@@ -2250,36 +2298,4 @@ deserialisation support to protect against this 
vulnerability.&lt;/p&gt;
 &lt;li&gt;&lt;a 
href="https://issues.apache.org/jira/browse/SOLR-11486"&gt;https://issues.apache.org/jira/browse/SOLR-11486&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a 
href="https://issues.apache.org/jira/browse/SOLR-10335"&gt;https://issues.apache.org/jira/browse/SOLR-10335&lt;/a&gt;&lt;/li&gt;
 &lt;li&gt;&lt;a 
href="https://cwiki.apache.org/confluence/display/solr/SolrSecurity"&gt;https://cwiki.apache.org/confluence/display/solr/SolrSecurity&lt;/a&gt;&lt;/li&gt;
-&lt;/ul&gt;</content><category 
term="solr/security"></category></entry><entry><title>Apache Solr™ 5.5.5 
available</title><link href="/" 
rel="alternate"></link><published>2017-10-24T00:00:00+00:00</published><updated>2017-10-24T00:00:00+00:00</updated><author><name>Solr
 Developers</name></author><id>tag:None,2017-10-24:/</id><summary 
type="html">&lt;p&gt;The Lucene PMC is pleased to announce the release of 
Apache Solr 5.5.5.&lt;/p&gt;
-&lt;p&gt;Solr is the popular, blazing fast, open source NoSQL search platform 
from the Apache Lucene project. Its major features include powerful full-text 
search, hit highlighting, faceted search and analytics, rich document parsing, 
geospatial search, extensive …&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;The Lucene PMC is pleased to announce the release of 
Apache Solr 5.5.5.&lt;/p&gt;
-&lt;p&gt;Solr is the popular, blazing fast, open source NoSQL search platform 
from the Apache Lucene project. Its major features include powerful full-text 
search, hit highlighting, faceted search and analytics, rich document parsing, 
geospatial search, extensive REST APIs as well as parallel SQL. Solr is 
enterprise grade, secure and highly scalable, providing fault tolerant 
distributed search and indexing, and powers the search and navigation features 
of many of the world's largest inte [...]
-&lt;p&gt;This release contains one bugfix.&lt;/p&gt;
-&lt;p&gt;This release includes one critical and one important security fix. 
Details:&lt;/p&gt;
-&lt;ul&gt;
-&lt;li&gt;
-&lt;p&gt;Fix for a 0-day exploit (CVE-2017-12629), details: &lt;a 
href="https://s.apache.org/FJDl"&gt;https://s.apache.org/FJDl&lt;/a&gt;. 
RunExecutableListener has been disabled by default (can be enabled by 
-Dsolr.enableRunExecutableListener=true) and resolving external entities in the 
XML query parser (defType=xmlparser or {!xmlparser ... }) is disabled by 
default.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-&lt;p&gt;Fix for CVE-2017-7660: Security Vulnerability in secure inter-node 
communication in Apache Solr, details: &lt;a 
href="https://s.apache.org/APTY"&gt;https://s.apache.org/APTY&lt;/a&gt;&lt;/p&gt;
-&lt;/li&gt;
-&lt;/ul&gt;
-&lt;p&gt;Furthermore, this release includes Apache Lucene 5.5.5 which includes 
one security fix since the 5.5.4 release.&lt;/p&gt;
-&lt;p&gt;The release is available for immediate download at:&lt;/p&gt;
-&lt;p&gt;&lt;a 
href="https://www.apache.org/dyn/closer.lua/lucene/solr/5.5.5"&gt;https://www.apache.org/dyn/closer.lua/lucene/solr/5.5.5&lt;/a&gt;&lt;/p&gt;
-&lt;p&gt;Please read CHANGES.txt for a detailed list of changes:&lt;/p&gt;
-&lt;p&gt;&lt;a 
href="https://solr.apache.org/5_5_5/changes/Changes.html"&gt;https://solr.apache.org/5_5_5/changes/Changes.html&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/news"></category></entry><entry><title>Apache Solr™ 6.6.2 
available</title><link href="/" 
rel="alternate"></link><published>2017-10-18T00:00:00+00:00</published><updated>2017-10-18T00:00:00+00:00</updated><author><name>Solr
 Developers</name></author><id>tag:None,2017-10-18:/</id><summary 
type="html">&lt;p&gt;The L [...]
-&lt;p&gt;Solr is the popular, blazing fast, open source NoSQL search platform 
from the Apache Lucene project. Its major features include powerful full-text 
search, hit highlighting, faceted search and analytics, rich document parsing, 
geospatial search, extensive …&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;The Lucene PMC is pleased to announce the release of 
Apache Solr 6.6.2&lt;/p&gt;
-&lt;p&gt;Solr is the popular, blazing fast, open source NoSQL search platform 
from the Apache Lucene project. Its major features include powerful full-text 
search, hit highlighting, faceted search and analytics, rich document parsing, 
geospatial search, extensive REST APIs as well as parallel SQL. Solr is 
enterprise grade, secure and highly scalable, providing fault tolerant 
distributed search and indexing, and powers the search and navigation features 
of many of the world's largest inte [...]
-&lt;h3 id="highlights-for-this-solr-release-includes"&gt;Highlights for this 
Solr release includes:&lt;/h3&gt;
-&lt;ul&gt;
-&lt;li&gt;
-&lt;p&gt;Critical security fix: Fix for a 0-day exploit (CVE-2017-12629), 
details: https://s.apache.org/FJDl. RunExecutableListener has been disabled by 
default (can be enabled by -Dsolr.enableRunExecutableListener=true) and 
resolving external entities in the XML query parser (defType=xmlparser or 
{!xmlparser ... }) is disabled by default.&lt;/p&gt;
-&lt;/li&gt;
-&lt;li&gt;
-&lt;p&gt;Fix for a bug where Solr was attempting to load the same core twice 
(Error message: "Lock held by this virtual machine").&lt;/p&gt;
-&lt;/li&gt;
-&lt;/ul&gt;
-&lt;p&gt;The release is available for immediate download at:&lt;/p&gt;
-&lt;p&gt;&lt;a 
href="https://www.apache.org/dyn/closer.lua/lucene/solr/6.6.2"&gt;https://www.apache.org/dyn/closer.lua/lucene/solr/6.6.2&lt;/a&gt;&lt;/p&gt;
-&lt;p&gt;Please read CHANGES.txt for a detailed list of changes:&lt;/p&gt;
-&lt;p&gt;&lt;a 
href="https://solr.apache.org/6_6_2/changes/Changes.html"&gt;https://solr.apache.org/6_6_2/changes/Changes.html&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/news"></category></entry></feed>
\ No newline at end of file
+&lt;/ul&gt;</content><category term="solr/security"></category></entry></feed>
\ No newline at end of file
diff --git a/output/feeds/solr/security.atom.xml 
b/output/feeds/solr/security.atom.xml
index 762fe5aa1..4d2a4a52c 100644
--- a/output/feeds/solr/security.atom.xml
+++ b/output/feeds/solr/security.atom.xml
@@ -1,5 +1,53 @@
 <?xml version="1.0" encoding="utf-8"?>
-<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr - 
solr/security</title><link href="/" rel="alternate"></link><link 
href="/feeds/solr/security.atom.xml" 
rel="self"></link><id>/</id><updated>2024-10-14T00:00:00+00:00</updated><entry><title>CVE-2024-45216:
 Apache Solr: Authentication bypass possible using a fake URL Path 
ending</title><link 
href="/cve-2024-45216-apache-solr-authentication-bypass-possible-using-a-fake-url-path-ending.html"
 rel="alternate"></link><published>2024- [...]
+<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr - 
solr/security</title><link href="/" rel="alternate"></link><link 
href="/feeds/solr/security.atom.xml" 
rel="self"></link><id>/</id><updated>2025-01-26T00:00:00+00:00</updated><entry><title>CVE-2024-52012:
 Apache Solr: Configset upload on Windows allows arbitrary path 
write-access</title><link 
href="/cve-2024-52012-apache-solr-configset-upload-on-windows-allows-arbitrary-path-write-access.html"
 rel="alternate"></link><published [...]
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.6 through 9.7.0&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Relative Path Traversal vulnerability in Apache Solr.&lt;/p&gt;
+&lt;p&gt;Solr instances running on Windows are vulnerable to arbitrary 
filepath write-access, due to a lack of input-sanitation in the "configset 
upload" API.  Commonly known as a "zipslip", maliciously constructed ZIP 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.6 through 9.7.0&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Relative Path Traversal vulnerability in Apache Solr.&lt;/p&gt;
+&lt;p&gt;Solr instances running on Windows are vulnerable to arbitrary 
filepath write-access, due to a lack of input-sanitation in the "configset 
upload" API.  Commonly known as a "zipslip", maliciously constructed ZIP files 
can use relative filepaths to write data to unanticipated parts of the 
filesystem.&lt;br&gt;
+This issue affects Apache Solr: from 6.6 through 9.7.0.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Users are recommended to upgrade to version 9.8.0, which fixes the 
issue.  Users unable to upgrade may also safely prevent the issue by using 
Solr's "Rule-Based Authentication Plugin" to restrict access to the configset 
upload API, so that it can only be accessed by a trusted set of 
administrators/users.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit&lt;/strong&gt;
+rry (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-17543"&gt;SOLR-17543&lt;/a&gt;
+CVE - &lt;a 
href="https://www.cve.org/CVERecord?id=CVE-2024-52012"&gt;CVE-2024-52012&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>CVE-2025-24814: Apache 
Solr: Core-creation with "trusted" configset can use arbitrary untrusted 
files</title><link 
href="/cve-2025-24814-apache-solr-core-creation-with-trusted-configset-can-use-arbitrary-untrusted-files.html"
 
rel="alternate"></link><published>2025-01-26T00:00:00+00:00</published><updated>2025-01-
 [...]
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr through 9.7&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Core creation allows users to replace "trusted" configset files with 
arbitrary configuration&lt;/p&gt;
+&lt;p&gt;Solr instances that (1) use the "FileSystemConfigSetService" 
component (the default in "standalone" or "user-managed" mode), and (2) are 
running without authentication and authorization are vulnerable to a sort 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity&lt;/strong&gt;
+moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr through 9.7&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Core creation allows users to replace "trusted" configset files with 
arbitrary configuration&lt;/p&gt;
+&lt;p&gt;Solr instances that (1) use the "FileSystemConfigSetService" 
component (the default in "standalone" or "user-managed" mode), and (2) are 
running without authentication and authorization are vulnerable to a sort of 
privilege escalation wherein individual "trusted" configset files can be 
ignored in favor of potentially-untrusted replacements available elsewhere on 
the filesystem.  These replacement config files are treated as "trusted" and 
can use "&lt;lib&gt;" tags to add to Solr [...]
+&lt;p&gt;This issue affects all Apache Solr versions up through Solr 
9.7.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation&lt;/strong&gt;&lt;/p&gt;
+&lt;p&gt;Users can protect against the vulnerability by enabling 
authentication and authorization on their Solr clusters or switching to 
SolrCloud (and away from "FileSystemConfigSetService").  Users are also 
recommended to upgrade to Solr 9.8.0, which mitigates this issue by disabling 
use of "&lt;lib&gt;" tags by default.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit&lt;/strong&gt;
+pwn null (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References&lt;/strong&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-16781"&gt;SOLR-16781&lt;/a&gt;
+CVE - &lt;a 
href="https://www.cve.org/CVERecord?id=CVE-2025-24814"&gt;CVE-2025-24814&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>CVE-2024-45216: Apache 
Solr: Authentication bypass possible using a fake URL Path ending</title><link 
href="/cve-2024-45216-apache-solr-authentication-bypass-possible-using-a-fake-url-path-ending.html"
 
rel="alternate"></link><published>2024-10-14T00:00:00+00:00</published><updated>2024-10-14T00:00:00+00:00</updat
 [...]
 Critical&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
 &lt;ul&gt;
diff --git a/output/index.html b/output/index.html
index 62cec8046..4c84dcebe 100644
--- a/output/index.html
+++ b/output/index.html
@@ -114,7 +114,7 @@
 </div>
 
 <div class="header-fill"></div>
-<section class="security" latest-date="2024-10-14">
+<section class="security" latest-date="2025-01-26">
   <div class="row">
     <div class="large-12 columns text-center">
       <h2><a href="security.html">&#x26A0; There are recent security 
announcements. Read more on the Security page.</a></h2>
diff --git a/output/news.html b/output/news.html
index a7b0bd01c..8e4b6043d 100644
--- a/output/news.html
+++ b/output/news.html
@@ -134,6 +134,46 @@
   <h1 id="solr-news">Solr<sup>™</sup> News<a class="headerlink" 
href="#solr-news" title="Permanent link">¶</a></h1>
   <p>You may also read these news as an <a 
href="/feeds/solr/news.atom.xml">ATOM feed</a>.</p>
 
+  <h2 
id="cve-2024-52012-apache-solr-configset-upload-on-windows-allows-arbitrary-path-write-access">26
 January 2025, CVE-2024-52012: Apache Solr: Configset upload on Windows allows 
arbitrary path write-access
+    <a class="headerlink" 
href="#cve-2024-52012-apache-solr-configset-upload-on-windows-allows-arbitrary-path-write-access"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity</strong>
+moderate</p>
+<p><strong>Versions Affected</strong></p>
+<ul>
+<li>Apache Solr 6.6 through 9.7.0</li>
+</ul>
+<p><strong>Description</strong></p>
+<p>Relative Path Traversal vulnerability in Apache Solr.</p>
+<p>Solr instances running on Windows are vulnerable to arbitrary filepath 
write-access, due to a lack of input-sanitation in the "configset upload" API.  
Commonly known as a "zipslip", maliciously constructed ZIP files can use 
relative filepaths to write data to unanticipated parts of the filesystem.<br>
+This issue affects Apache Solr: from 6.6 through 9.7.0.</p>
+<p><strong>Mitigation</strong></p>
+<p>Users are recommended to upgrade to version 9.8.0, which fixes the issue.  
Users unable to upgrade may also safely prevent the issue by using Solr's 
"Rule-Based Authentication Plugin" to restrict access to the configset upload 
API, so that it can only be accessed by a trusted set of 
administrators/users.</p>
+<p><strong>Credit</strong>
+rry (reporter)</p>
+<p><strong>References</strong>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-17543";>SOLR-17543</a>
+CVE - <a 
href="https://www.cve.org/CVERecord?id=CVE-2024-52012";>CVE-2024-52012</a></p>
+  <h2 
id="cve-2025-24814-apache-solr-core-creation-with-trusted-configset-can-use-arbitrary-untrusted-files">26
 January 2025, CVE-2025-24814: Apache Solr: Core-creation with "trusted" 
configset can use arbitrary untrusted files
+    <a class="headerlink" 
href="#cve-2025-24814-apache-solr-core-creation-with-trusted-configset-can-use-arbitrary-untrusted-files"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity</strong>
+moderate</p>
+<p><strong>Versions Affected</strong></p>
+<ul>
+<li>Apache Solr through 9.7</li>
+</ul>
+<p><strong>Description</strong></p>
+<p>Core creation allows users to replace "trusted" configset files with 
arbitrary configuration</p>
+<p>Solr instances that (1) use the "FileSystemConfigSetService" component (the 
default in "standalone" or "user-managed" mode), and (2) are running without 
authentication and authorization are vulnerable to a sort of privilege 
escalation wherein individual "trusted" configset files can be ignored in favor 
of potentially-untrusted replacements available elsewhere on the filesystem.  
These replacement config files are treated as "trusted" and can use "<lib>" 
tags to add to Solr's classpath [...]
+<p>This issue affects all Apache Solr versions up through Solr 9.7.</p>
+<p><strong>Mitigation</strong></p>
+<p>Users can protect against the vulnerability by enabling authentication and 
authorization on their Solr clusters or switching to SolrCloud (and away from 
"FileSystemConfigSetService").  Users are also recommended to upgrade to Solr 
9.8.0, which mitigates this issue by disabling use of "<lib>" tags by 
default.</p>
+<p><strong>Credit</strong>
+pwn null (reporter)</p>
+<p><strong>References</strong>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-16781";>SOLR-16781</a>
+CVE - <a 
href="https://www.cve.org/CVERecord?id=CVE-2025-24814";>CVE-2025-24814</a></p>
   <h2 id="apache-solrtm-980-available">23 January 2025, Apache Solr™ 9.8.0 
available
     <a class="headerlink" href="#apache-solrtm-980-available" title="Permanent 
link">¶</a>
   </h2>
diff --git a/output/operator/index.html b/output/operator/index.html
index d10777f37..ed4e872fc 100644
--- a/output/operator/index.html
+++ b/output/operator/index.html
@@ -106,7 +106,7 @@
 </div>
 
 <div class="header-fill"></div>
-<section class="security" latest-date="2024-10-14">
+<section class="security" latest-date="2025-01-26">
   <div class="row">
     <div class="large-12 columns text-center">
       <h2><a href="/security.html">&#x26A0; There are recent security 
announcements. Read more on the Solr Security page.</a></h2>
diff --git a/output/security.html b/output/security.html
index 117264e69..d369b693b 100644
--- a/output/security.html
+++ b/output/security.html
@@ -189,6 +189,16 @@ with you to see if we can provide this information in 
other variations or format
             <th width="95">Date</th>
             <th>Announcement</th>
         </tr>
+        <tr>
+            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2024-52012";>CVE-2024-52012</a></td>
+            <td>2025-01-26</td>
+            <td><a 
href="#cve-2024-52012-apache-solr-configset-upload-on-windows-allows-arbitrary-path-write-access">Apache
 Solr: Configset upload on Windows allows arbitrary path write-access</a></td>
+        </tr>
+        <tr>
+            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2025-24814";>CVE-2025-24814</a></td>
+            <td>2025-01-26</td>
+            <td><a 
href="#cve-2025-24814-apache-solr-core-creation-with-trusted-configset-can-use-arbitrary-untrusted-files">Apache
 Solr: Core-creation with "trusted" configset can use arbitrary untrusted 
files</a></td>
+        </tr>
         <tr>
             <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2024-45216";>CVE-2024-45216</a></td>
             <td>2024-10-14</td>
@@ -254,18 +264,50 @@ with you to see if we can provide this information in 
other variations or format
             <td>2021-04-12</td>
             <td><a 
href="#cve-2021-29262-misapplied-zookeeper-acls-can-result-in-leakage-of-configured-authentication-and-authorization-settings">Misapplied
 Zookeeper ACLs can result in leakage of configured authentication and 
authorization settings</a></td>
         </tr>
-        <tr>
-            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2021-29943";>CVE-2021-29943</a></td>
-            <td>2021-04-12</td>
-            <td><a 
href="#cve-2021-29943-apache-solr-unprivileged-users-may-be-able-to-perform-unauthorized-readwrite-to-collections">Apache
 Solr Unprivileged users may be able to perform unauthorized read/write to 
collections</a></td>
-        </tr>
-        <tr>
-            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2020-13957";>CVE-2020-13957</a></td>
-            <td>2020-10-12</td>
-            <td><a 
href="#cve-2020-13957-the-checks-added-to-unauthenticated-configset-uploads-in-apache-solr-can-be-circumvented">The
 checks added to unauthenticated configset uploads in Apache Solr can be 
circumvented</a></td>
-        </tr>
     </table>
 
+  <h2 
id="cve-2024-52012-apache-solr-configset-upload-on-windows-allows-arbitrary-path-write-access">2025-01-26,
 CVE-2024-52012: Apache Solr: Configset upload on Windows allows arbitrary path 
write-access
+    <a class="headerlink" 
href="#cve-2024-52012-apache-solr-configset-upload-on-windows-allows-arbitrary-path-write-access"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity</strong>
+moderate</p>
+<p><strong>Versions Affected</strong></p>
+<ul>
+<li>Apache Solr 6.6 through 9.7.0</li>
+</ul>
+<p><strong>Description</strong></p>
+<p>Relative Path Traversal vulnerability in Apache Solr.</p>
+<p>Solr instances running on Windows are vulnerable to arbitrary filepath 
write-access, due to a lack of input-sanitation in the "configset upload" API.  
Commonly known as a "zipslip", maliciously constructed ZIP files can use 
relative filepaths to write data to unanticipated parts of the filesystem.<br>
+This issue affects Apache Solr: from 6.6 through 9.7.0.</p>
+<p><strong>Mitigation</strong></p>
+<p>Users are recommended to upgrade to version 9.8.0, which fixes the issue.  
Users unable to upgrade may also safely prevent the issue by using Solr's 
"Rule-Based Authentication Plugin" to restrict access to the configset upload 
API, so that it can only be accessed by a trusted set of 
administrators/users.</p>
+<p><strong>Credit</strong>
+rry (reporter)</p>
+<p><strong>References</strong>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-17543";>SOLR-17543</a>
+CVE - <a 
href="https://www.cve.org/CVERecord?id=CVE-2024-52012";>CVE-2024-52012</a></p>
+  <hr/>
+  <h2 
id="cve-2025-24814-apache-solr-core-creation-with-trusted-configset-can-use-arbitrary-untrusted-files">2025-01-26,
 CVE-2025-24814: Apache Solr: Core-creation with "trusted" configset can use 
arbitrary untrusted files
+    <a class="headerlink" 
href="#cve-2025-24814-apache-solr-core-creation-with-trusted-configset-can-use-arbitrary-untrusted-files"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity</strong>
+moderate</p>
+<p><strong>Versions Affected</strong></p>
+<ul>
+<li>Apache Solr through 9.7</li>
+</ul>
+<p><strong>Description</strong></p>
+<p>Core creation allows users to replace "trusted" configset files with 
arbitrary configuration</p>
+<p>Solr instances that (1) use the "FileSystemConfigSetService" component (the 
default in "standalone" or "user-managed" mode), and (2) are running without 
authentication and authorization are vulnerable to a sort of privilege 
escalation wherein individual "trusted" configset files can be ignored in favor 
of potentially-untrusted replacements available elsewhere on the filesystem.  
These replacement config files are treated as "trusted" and can use "<lib>" 
tags to add to Solr's classpath [...]
+<p>This issue affects all Apache Solr versions up through Solr 9.7.</p>
+<p><strong>Mitigation</strong></p>
+<p>Users can protect against the vulnerability by enabling authentication and 
authorization on their Solr clusters or switching to SolrCloud (and away from 
"FileSystemConfigSetService").  Users are also recommended to upgrade to Solr 
9.8.0, which mitigates this issue by disabling use of "<lib>" tags by 
default.</p>
+<p><strong>Credit</strong>
+pwn null (reporter)</p>
+<p><strong>References</strong>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-16781";>SOLR-16781</a>
+CVE - <a 
href="https://www.cve.org/CVERecord?id=CVE-2025-24814";>CVE-2025-24814</a></p>
+  <hr/>
   <h2 
id="cve-2024-45216-apache-solr-authentication-bypass-possible-using-a-fake-url-path-ending">2024-10-14,
 CVE-2024-45216: Apache Solr: Authentication bypass possible using a fake URL 
Path ending
     <a class="headerlink" 
href="#cve-2024-45216-apache-solr-authentication-bypass-possible-using-a-fake-url-path-ending"
 title="Permanent link">¶</a>
   </h2>
@@ -583,53 +625,6 @@ Any of the following are enough to prevent this 
vulnerability:</p>
 Timothy Potter and Mike Drob, Apple Cloud Services</p>
 <p><strong>References:</strong>
 <a href="https://issues.apache.org/jira/browse/SOLR-15249";>SOLR-15249</a>: 
CVE-2021-29262: Misapplied Zookeeper ACLs can result in leakage of configured 
authentication and authorization settings</p>
-  <hr/>
-  <h2 
id="cve-2021-29943-apache-solr-unprivileged-users-may-be-able-to-perform-unauthorized-readwrite-to-collections">2021-04-12,
 CVE-2021-29943: Apache Solr Unprivileged users may be able to perform 
unauthorized read/write to collections
-    <a class="headerlink" 
href="#cve-2021-29943-apache-solr-unprivileged-users-may-be-able-to-perform-unauthorized-readwrite-to-collections"
 title="Permanent link">¶</a>
-  </h2>
-  <p><strong>Severity:</strong>
-High</p>
-<p><strong>Versions Affected:</strong>
-7.0.0 to 7.7.3
-8.0.0 to 8.8.1</p>
-<p><strong>Description:</strong>
-When using ConfigurableInternodeAuthHadoopPlugin for authentication, Apache 
Solr versions prior to 8.8.2 would forward/proxy distributed requests using 
server credentials instead of original client credentials. This would result in 
incorrect authorization resolution on the receiving hosts.</p>
-<p><strong>Mitigation:</strong>
-Any of the following are enough to prevent this vulnerability:</p>
-<ul>
-<li>Upgrade to <code>Solr 8.8.2</code> or greater.</li>
-<li>If upgrading is not an option, consider applying the patch in <a 
href="https://issues.apache.org/jira/browse/SOLR-15233";>SOLR-15233</a></li>
-<li>Use a different authentication plugin, such as the KerberosPlugin or 
HadoopAuthPlugin</li>
-</ul>
-<p><strong>Credit:</strong>
-Geza Nagy</p>
-<p><strong>References:</strong>
-<a href="https://issues.apache.org/jira/browse/SOLR-15233";>SOLR-15233</a>: 
CVE-2021-29943: Apache Solr Unprivileged users may be able to perform 
unauthorized read/write to collections </p>
-  <hr/>
-  <h2 
id="cve-2020-13957-the-checks-added-to-unauthenticated-configset-uploads-in-apache-solr-can-be-circumvented">2020-10-12,
 CVE-2020-13957: The checks added to unauthenticated configset uploads in 
Apache Solr can be circumvented
-    <a class="headerlink" 
href="#cve-2020-13957-the-checks-added-to-unauthenticated-configset-uploads-in-apache-solr-can-be-circumvented"
 title="Permanent link">¶</a>
-  </h2>
-  <p><strong>Severity:</strong>
-High</p>
-<p><strong>Versions Affected:</strong>
-6.6.0 to 6.6.6
-7.0.0 to 7.7.3
-8.0.0 to 8.6.2</p>
-<p><strong>Description:</strong>
-Solr prevents some features considered dangerous (which could be used for 
remote code execution) to be configured in a ConfigSet that's uploaded via API 
without authentication/authorization. The checks in place to prevent such 
features can be circumvented by using a combination of UPLOAD/CREATE 
actions.</p>
-<p><strong>Mitigation:</strong>
-Any of the following are enough to prevent this vulnerability:</p>
-<ul>
-<li>Disable UPLOAD command in ConfigSets API if not used by setting the system 
property: <code>configset.upload.enabled</code> to <code>false</code> (<a 
href="https://solr.apache.org/guide/8_6/configsets-api.html";>see docs</a>)</li>
-<li>Use Authentication/Authorization and make sure unknown requests aren't 
allowed (<a 
href="https://solr.apache.org/guide/8_6/authentication-and-authorization-plugins.html";>see
 docs</a>)</li>
-<li>Upgrade to <code>Solr 8.6.3</code> or greater.</li>
-<li>If upgrading is not an option, consider applying the patch in <a 
href="https://issues.apache.org/jira/browse/SOLR-14663";>SOLR-14663</a></li>
-<li>No Solr API, including the Admin UI, is designed to be exposed to 
non-trusted parties. Tune your firewall so that only trusted computers and 
people are allowed access</li>
-</ul>
-<p><strong>Credit:</strong>
-Tomás Fernández Löbbe, András Salamon</p>
-<p><strong>References:</strong>
-<a href="https://issues.apache.org/jira/browse/SOLR-14925";>SOLR-14925</a>: 
CVE-2020-13957: The checks added to unauthenticated configset uploads can be 
circumvented</p>
   <hr/>
   <h1 id="cve-reports-for-apache-solr-dependencies">CVE reports for Apache 
Solr dependencies</h1>
   <p>Below is a list of CVE vulnerabilities in Apache Solr dependencies, and 
the state of their applicability to Solr.</p>


Reply via email to