SSRF vulnerability with the Replication handler
Description
The ReplicationHandler (normally registered at "/replication" under a Solr core) in Apache Solr has a "masterUrl" (also "leaderUrl" alias) parameter that is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To prevent a SSRF vulnerability, Solr ought to check these parameters against a similar configuration it uses for the "shards" parameter. Prior to this bug getting fixed, it did not. This problem affects essentially all Solr versions prior to it getting fixed in 8.8.2.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Solr ReplicationHandler before 8.8.2 lacks a host whitelist check for masterUrl/leaderUrl, enabling unauthenticated SSRF from any client.
Vulnerability
The ReplicationHandler in Apache Solr, registered at /replication under a Solr core, accepts a masterUrl (or leaderUrl) parameter to designate a remote Solr core from which to replicate index data. Prior to version 8.8.2, Solr did not validate this URL against an internal whitelist, unlike the similar check it performs for the shards parameter. This missing restriction allows an attacker to specify an arbitrary host as the source for replication, enabling a server-side request forgery (SSRF). [1]
Exploitation
An attacker can issue a replication request to any vulnerable Solr core's /replication endpoint (e.g., via a command like ?command=fetchindex&masterUrl=http://internal-service:8080/). The attacker does not need authentication; the ReplicationHandler endpoint is typically accessible to any client that can reach the Solr HTTP port. No user interaction is required beyond sending the crafted request. [1]
Impact
Successful exploitation allows the attacker to force the Solr server to make HTTP requests to arbitrary internal network hosts, potentially accessing sensitive services, reading local files (if a responsive service returns data that Solr attempts to index), or performing reflection attacks. The compromise targets the confidentiality of internal resources reachable by the Solr server. [1]
Mitigation
Apache Solr fixed this vulnerability in version 8.8.2 (released 2021-04-12) by adding validation of the masterUrl parameter against a whitelist of allowed hosts. Users should upgrade to Solr 8.8.2 or later. There is no known workaround for installations that cannot upgrade immediately; administrators may restrict network access to the /replication endpoint via firewall rules or reverse-proxy filtering. [1]
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.solr:solr-parentMaven | < 8.8.2 | 8.8.2 |
Affected products
3- osv-coords2 versions
< 8.8.2+ 1 more
- (no CPE)range: < 8.8.2
- (no CPE)range: < 8.8.2
- Apache Software Foundation/Apache Solrv5Range: Apache Solr
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
25- github.com/advisories/GHSA-5phw-3jrp-3vj8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-27905ghsaADVISORY
- lists.apache.org/thread.html/r0ddc3a82bd7523b1453cb7a5e09eb5559517145425074a42eb326b10%40%3Cannounce.apache.org%3Eghsax_refsource_MISCWEB
- lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc%40%3Cusers.solr.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r140128dc6bb4f4e0b6a39e962c7ca25a8cbc8e48ed766176c931fccc@%3Cusers.solr.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314%40%3Cusers.solr.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r3da74965aba2b5f5744b7289ad447306eeb2940c872801819faa9314@%3Cusers.solr.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r6ccec7fc54d82591b23c143f1f6a6e38f6e03e75db70870e4cb14a1a%40%3Ccommits.ofbiz.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r6ccec7fc54d82591b23c143f1f6a6e38f6e03e75db70870e4cb14a1a@%3Ccommits.ofbiz.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r720a4a0497fc90bad5feec8aa18b777912ee15c7eeb5f882adbf523e%40%3Ccommits.ofbiz.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r720a4a0497fc90bad5feec8aa18b777912ee15c7eeb5f882adbf523e@%3Ccommits.ofbiz.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r78a3a4f1138a1608b0c6d4a2ee7647848c1a20b0d5c652cd9b02c25a%40%3Ccommits.ofbiz.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r78a3a4f1138a1608b0c6d4a2ee7647848c1a20b0d5c652cd9b02c25a@%3Ccommits.ofbiz.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r8f1152a43c36d878bbeb5a92f261e9efaf3af313b033d7acfccea59d%40%3Cnotifications.ofbiz.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r8f1152a43c36d878bbeb5a92f261e9efaf3af313b033d7acfccea59d@%3Cnotifications.ofbiz.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef%40%3Cusers.solr.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r95df34bb158375948da82b4dfe9a1b5d528572d586584162f8f5aeef@%3Cusers.solr.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rae9ccaecce9859f709ed1458545d90a4c07163070dc98b5e9e59057f%40%3Cnotifications.ofbiz.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rae9ccaecce9859f709ed1458545d90a4c07163070dc98b5e9e59057f@%3Cnotifications.ofbiz.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rd232d77c57a8ce172359ab098df9512d8b37373ab87c444be911b430%40%3Cnotifications.ofbiz.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rd232d77c57a8ce172359ab098df9512d8b37373ab87c444be911b430@%3Cnotifications.ofbiz.apache.org%3EghsaWEB
- lists.apache.org/thread.html/re9d64bb8e5dfefddcbf255adb4559e13a0df5b818da1b9b51329723f%40%3Cnotifications.ofbiz.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/re9d64bb8e5dfefddcbf255adb4559e13a0df5b818da1b9b51329723f@%3Cnotifications.ofbiz.apache.org%3EghsaWEB
- security.netapp.com/advisory/ntap-20210611-0009ghsaWEB
- security.netapp.com/advisory/ntap-20210611-0009/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.