CVE-2018-1308:
There is a XML external entity expansion (XXE) vulnerability in Apache Solr
7.5
CVSS ScoreBasic Information
CVE ID
GHSA ID
EPSS Score
-
CWE
Published
10/17/2018
Updated
3/4/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.solr:solr-core | maven | >= 1.2, < 6.6.3 | 6.6.3 |
org.apache.solr:solr-core | maven | >= 7.0.0, < 7.3.0 | 7.3.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from insecure XML parsing in DataImportHandler's configuration processing. The commit diffs show critical changes in DataImporter.java where:
- DocumentBuilderFactory security settings were added (dbf.setValidating(false))
- Entity resolution was restricted to EmptyEntityResolver.SAX_INSTANCE when systemId isn't present
- XInclude handling was gated behind systemId validation These changes indicate the original implementation lacked proper restrictions for external entity expansion when parsing user-controlled XML input via the dataConfig parameter, making the loadDataConfig function the vulnerable entry point. The test case additions in TestErrorHandling.java further validate that external entity handling was a core issue.