CVE-2024-45216: Improper Authentication vulnerability in Apache Solr
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99866%
CWE
Published
10/16/2024
Updated
10/16/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.solr:solr | maven | >= 5.3.0, < 8.11.4 | 8.11.4 |
org.apache.solr:solr | maven | >= 9.0.0, < 9.7.0 | 9.7.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from path processing sequence where:
- Authentication checks occur on the original URL (including fake endings)
- Path gets normalized/stripped after authentication
- Routing uses the modified path
This creates a mismatch between the authenticated path and executed path. The PKIAuthenticationPlugin.authenticate method would appear in runtime profiles during exploitation as it's the entry point for authentication decisions using the vulnerable path handling. The JIRA ticket SOLR-17417 and reproduction steps confirm the authentication bypass occurs through path manipulation handled by this plugin.