Miggo Logo

CVE-2024-45216: Improper Authentication vulnerability in Apache Solr

9.8

CVSS Score
3.1

Basic Information

EPSS Score
0.99866%
Published
10/16/2024
Updated
10/16/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.solr:solrmaven>= 5.3.0, < 8.11.48.11.4
org.apache.solr:solrmaven>= 9.0.0, < 9.7.09.7.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from path processing sequence where:

  1. Authentication checks occur on the original URL (including fake endings)
  2. Path gets normalized/stripped after authentication
  3. Routing uses the modified path

This creates a mismatch between the authenticated path and executed path. The PKIAuthenticationPlugin.authenticate method would appear in runtime profiles during exploitation as it's the entry point for authentication decisions using the vulnerable path handling. The JIRA ticket SOLR-17417 and reproduction steps confirm the authentication bypass occurs through path manipulation handled by this plugin.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

Solr inst*n**s usin* t** PKI*ut**nti**tionPlu*in, w*i** is *n**l** *y ****ult w**n Solr *ut**nti**tion is us**, *r* vuln*r**l* to *ut**nti**tion *yp*ss. * **k* *n*in* *t t** *n* o* *ny Solr *PI URL p*t*, will *llow r*qu*sts to skip *ut**nti**tion w*i

Reasoning

T** vuln*r**ility st*ms *rom p*t* pro**ssin* s*qu*n** w**r*: *. *ut**nti**tion ****ks o**ur on t** ori*in*l URL (in*lu*in* **k* *n*in*s) *. P*t* **ts norm*liz**/stripp** **t*r *ut**nti**tion *. Routin* us*s t** mo*i*i** p*t* T*is *r**t*s * mism*t**