CVE-2026-22022 (CNNVD-202601-3432)

HIGH
中文标题:
Apache Solr 安全漏洞
英文标题:
Apache Solr: Unauthorized bypass of certain "predefined permission" rules in the RuleBasedAuthorizationPlugin
CVSS分数: 8.2
发布时间: 2026-01-21 13:41:46
漏洞类型: 其他
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v4
漏洞描述
中文描述:

Apache Solr是美国阿帕奇(Apache)基金会的一款基于Lucene(一款全文搜索引擎)的搜索服务器。该产品支持层面搜索、垂直搜索、高亮显示搜索结果等。 Apache Solr 5.3.0版本至9.10.0版本存在安全漏洞,该漏洞源于基于规则的授权插件输入验证不足,可能导致对某些Solr API的未授权访问。

英文描述:

Deployments of Apache Solr 5.3.0 through 9.10.0 that rely on Solr's "Rule Based Authorization Plugin" are vulnerable to allowing unauthorized access to certain Solr APIs, due to insufficiently strict input validation in those components.  Only deployments that meet all of the following criteria are impacted by this vulnerability: * Use of Solr's "RuleBasedAuthorizationPlugin" * A RuleBasedAuthorizationPlugin config (see security.json) that specifies multiple "roles" * A RuleBasedAuthorizationPlugin permission list (see security.json) that uses one or more of the following pre-defined permission rules: "config-read", "config-edit", "schema-read", "metrics-read", or "security-read". * A RuleBasedAuthorizationPlugin permission list that doesn't define the "all" pre-defined permission * A networking setup that allows clients to make unfiltered network requests to Solr. (i.e. user-submitted HTTP/HTTPS requests reach Solr as-is, unmodified or restricted by any intervening proxy or gateway) Users can mitigate this vulnerability by ensuring that their RuleBasedAuthorizationPlugin configuration specifies the "all" pre-defined permission and associates the permission with an "admin" or other privileged role.  Users can also upgrade to a Solr version outside of the impacted range, such as the recently released Solr 9.10.1.

CWE类型:
CWE-285
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Apache Software Foundation Apache Solr - ≤ 9.10.0 - cpe:2.3:a:apache_software_foundation:apache_solr:*:*:*:*:*:*:*:*
apache solr * - - cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 vendor-advisory
cve.org
访问
af854a3a-2127-422b-91ae-364da2661108 OTHER
nvd.nist.gov
访问
CVSS评分详情
3.1 (adp)
HIGH
8.2
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N
机密性
HIGH
完整性
LOW
可用性
NONE
时间信息
发布时间:
2026-01-21 13:41:46
修改时间:
2026-01-21 15:35:07
创建时间:
2026-01-22 06:00:08
更新时间:
2026-01-28 06:00:19
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2026-22022 2026-01-22 03:19:49 2026-01-21 22:00:08
NVD nvd_CVE-2026-22022 2026-01-22 02:00:05 2026-01-21 22:00:14
CNNVD cnnvd_CNNVD-202601-3432 2026-01-26 02:10:03 2026-01-25 18:11:56
版本与语言
当前版本: v4
主要语言: EN
支持语言:
ZH EN
安全公告
暂无安全公告信息
变更历史
v4 NVD
2026-01-28 06:00:19
affected_products_count: 1 → 2
查看详细变更
  • affected_products_count: 1 -> 2
v3 CNNVD
2026-01-26 02:11:56
vulnerability_type: 未提取 → 其他; cnnvd_id: 未提取 → CNNVD-202601-3432; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 其他
  • cnnvd_id: 未提取 -> CNNVD-202601-3432
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2026-01-22 06:00:14
references_count: 1 → 2; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • references_count: 1 -> 2
  • data_sources: ['cve'] -> ['cve', 'nvd']