VYPR
High severityNVD Advisory· Published Mar 8, 2019· Updated Sep 16, 2024

CVE-2017-3164

CVE-2017-3164

Description

Server Side Request Forgery in Apache Solr, versions 1.3 until 7.6 (inclusive). Since the "shards" parameter does not have a corresponding whitelist mechanism, a remote attacker with access to the server could make Solr perform an HTTP GET request to any reachable URL.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Solr before 7.7 lacks a whitelist for the 'shards' parameter, allowing SSRF via arbitrary HTTP GET requests.

Vulnerability

Apache Solr versions 1.3 through 7.6 (inclusive) are vulnerable to Server-Side Request Forgery (SSRF) because the shards parameter in distributed search requests does not enforce a whitelist mechanism [1]. An attacker can supply a URL in the shards parameter, and Solr will perform an HTTP GET request to that arbitrary address.

Exploitation

A remote attacker with network access to the Solr server can craft a request containing a malicious shards parameter pointing to an internal or external URL. No authentication or special privileges are required if the Solr API is exposed. The attacker simply sends the request; the server then initiates the HTTP GET to the target.

Impact

An attacker can leverage this SSRF to probe internal network services, read metadata from cloud endpoints (e.g., AWS/EC2 metadata), or interact with other internal systems reachable from the Solr server. The impact is information disclosure and potential lateral movement depending on network configuration.

Mitigation

Apache Solr 7.7 and later contain a fix that introduces a whitelist for the shards parameter [1]. Users should upgrade to 7.7 or newer. If upgrading is not immediately possible, restrict network access to the Solr API using firewalls or reverse proxy rules, and limit outbound HTTP requests from the server.

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.solr:solr-coreMaven
>= 1.3.0, < 7.7.07.7.0

Affected products

2
  • ghsa-coords
    Range: >= 1.3.0, < 7.7.0
  • Apache Software Foundation/Apache Solrv5
    Range: Apache Solr 1.3.0 to 1.4.1, 3.1.0 to 3.6.2, 4.0.0 to 4.10.4, 5.0.0 to 5.5.5, 6.0.0 to 6.6.5, 7.0.0 to 7.6.0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

24

News mentions

0

No linked articles in our index yet.