VYPR
High severityNVD Advisory· Published Apr 13, 2021· Updated Aug 3, 2024

SSRF vulnerability with the Replication handler

CVE-2021-27905

Description

The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Solr ReplicationHandler before 8.8.2 lacks a host whitelist check for masterUrl/leaderUrl, enabling unauthenticated SSRF from any client.

Vulnerability

The ReplicationHandler in Apache Solr, registered at /replication under a Solr core, accepts a masterUrl (or leaderUrl) parameter to designate a remote Solr core from which to replicate index data. Prior to version 8.8.2, Solr did not validate this URL against an internal whitelist, unlike the similar check it performs for the shards parameter. This missing restriction allows an attacker to specify an arbitrary host as the source for replication, enabling a server-side request forgery (SSRF). [1]

Exploitation

An attacker can issue a replication request to any vulnerable Solr core's /replication endpoint (e.g., via a command like ?command=fetchindex&masterUrl=http://internal-service:8080/). The attacker does not need authentication; the ReplicationHandler endpoint is typically accessible to any client that can reach the Solr HTTP port. No user interaction is required beyond sending the crafted request. [1]

Impact

Successful exploitation allows the attacker to force the Solr server to make HTTP requests to arbitrary internal network hosts, potentially accessing sensitive services, reading local files (if a responsive service returns data that Solr attempts to index), or performing reflection attacks. The compromise targets the confidentiality of internal resources reachable by the Solr server. [1]

Mitigation

Apache Solr fixed this vulnerability in version 8.8.2 (released 2021-04-12) by adding validation of the masterUrl parameter against a whitelist of allowed hosts. Users should upgrade to Solr 8.8.2 or later. There is no known workaround for installations that cannot upgrade immediately; administrators may restrict network access to the /replication endpoint via firewall rules or reverse-proxy filtering. [1]

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.solr:solr-parentMaven
< 8.8.28.8.2

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

25

News mentions

0

No linked articles in our index yet.