[
https://issues.apache.org/jira/browse/SOLR-17809?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=18008762#comment-18008762
]
Houston Putman commented on SOLR-17809:
---------------------------------------
I think that is fair. The configuration is very very unlikely, so using
"not_affected" with a reason of "requires_configuration" makes sense to me.
> solrj module has transitive CVE-2024-51504 vulnerability
> --------------------------------------------------------
>
> Key: SOLR-17809
> URL: https://issues.apache.org/jira/browse/SOLR-17809
> Project: Solr
> Issue Type: Task
> Security Level: Public(Default Security Level. Issues are Public)
> Components: SolrJ
> Affects Versions: 9.8.1
> Reporter: Botond Brem
> Assignee: Houston Putman
> Priority: Major
> Labels: pull-request-available
> Fix For: 9.9
>
> Time Spent: 10m
> Remaining Estimate: 0h
>
> solrj has transitive CVE-2024-51504 vulnerability from
> solrj-zookeeper->[email protected]
> *CVE-2024-51504:*
> When using IPAuthenticationProvider in ZooKeeper Admin Server there is a
> possibility of Authentication Bypass by Spoofing -- this only impacts IP
> based authentication implemented in ZooKeeper Admin Server. Default
> configuration of client's IP address detection in IPAuthenticationProvider,
> which uses HTTP request headers, is weak and allows an attacker to bypass
> authentication via spoofing client's IP address in request headers. Default
> configuration honors X-Forwarded-For HTTP header to read client's IP address.
> X-Forwarded-For request header is mainly used by proxy servers to identify
> the client and can be easily spoofed by an attacker pretending that the
> request comes from a different IP address. Admin Server commands, such as
> snapshot and restore arbitrarily can be executed on successful exploitation
> which could potentially lead to information leakage or service availability
> issues. Users are recommended to upgrade to version 3.9.3, which fixes this
> issue.
>
> zookeeper module has a new version (3.9.3) where the vulnerability is
> resolved.
--
This message was sent by Atlassian Jira
(v8.20.10#820010)
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]