7.5
CVSSv3

CVE-2017-3164

Published: 08/03/2019 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to any reachable URL.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache solr

Vendor Advisories

Debian Bug report logs - #922242 lucene-solr: CVE-2017-3164 Package: src:lucene-solr; Maintainer for src:lucene-solr is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 13 Feb 2019 16:45:06 UTC Severity: important Tags: fixed-upst ...

Mailing Lists

CVE-2017-3164 SSRF issue in Apache Solr Severity: High Vendor: The Apache Software Foundation Versions Affected: Apache Solr versions from 13 to 760 Description: The "shards" parameter does not have a corresponding whitelist mechanism, so it can request any URL Mitigation: Upgrade to Apache Solr 770 or later Ensure your network settings ...

Github Repositories

Apache Solr Poc CVE-2017-3164 CVE-2017-12629

Apache Solr Poc CVE-2017-3164 CVE-2017-12629 This folder contains example exploits for Apache Solr CVE-2017-3164 CVE-2017-12629 To be use ONLY for education purposes and with full permission of the Apache Solr Server owner You will need to know the IP or DNS name of the Apache Solr server and the name of a Collection CVE-2017-3164 Server Side Request Forgery in Apache Solr, v