This is an automated email from the ASF dual-hosted git repository.

dsmiley pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/solr-site.git


The following commit(s) were added to refs/heads/main by this push:
     new 52db0d02b SOLR-17809: Add VEX for CVE-2024-51504 (Zookeeper) (#150)
52db0d02b is described below

commit 52db0d02b0b038a43d21867a15c1dcaf229aeb76
Author: Piotr P. Karwasz <[email protected]>
AuthorDate: Tue Jul 22 02:44:48 2025 +0200

    SOLR-17809: Add VEX for CVE-2024-51504 (Zookeeper) (#150)
    
    This change adds a VEX statement for CVE-2024-51504, concluding that the 
vulnerability is **not exploitable in typical production deployments** of 
Apache Solr (versions 3.4.0 to 3.8.1). The assessment is based on the following 
configuration-dependent conditions:
    
    - Solr must be running in [SolrCloud 
mode](https://solr.apache.org/guide/solr/latest/deployment-guide/cluster-types.html#solrcloud-mode),
 which uses Zookeeper.
    - The [embedded Zookeeper 
server](https://solr.apache.org/guide/solr/latest/deployment-guide/zookeeper-ensemble.html)
 must be in use — a configuration explicitly discouraged for production 
environments. Solr logs a warning when this setup is active, supporting the 
conclusion that it is not commonly used in production.
    - The Zookeeper Admin Server must be manually enabled in the 
`server/solr/zoo.cfg` file. By default, the file contains:
      ```properties
      # Disable ZK AdminServer since we do not use it
      admin.enableServer=false
      ```
    
    Given these requirements, the vulnerability is assessed as:
    
    * Status: `not_affected`
    * Justification: `requires_configuration`
---
 vex-input.json | 16 ++++++++++++++++
 1 file changed, 16 insertions(+)

diff --git a/vex-input.json b/vex-input.json
index d0abfb59b..2a376ef98 100644
--- a/vex-input.json
+++ b/vex-input.json
@@ -1,4 +1,20 @@
 [
+  {
+    "ids": [
+      "CVE-2024-51504"
+    ],
+    "versions": "9.4.0\u20139.8.1",
+    "jars": [
+      "zookeeper-3.9.0.jar",
+      "zookeeper-3.9.1.jar",
+      "zookeeper-3.9.2.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "justification": "requires_configuration",
+      "detail": "Solr production deployments are unlikely to be 
affected.\nExploitation requires Solr to run in SolrCloud mode with the 
embedded (non-production) Zookeeper server.\nIt also requires the Zookeeper 
Admin Server to be manually enabled in the configuration."
+    }
+  },
   {
     "ids": [
       "CVE-2024-6763"

Reply via email to