Misapplied Zookeeper ACLs can result in leakage of configured authentication and authorization settings
Description
When starting Apache Solr versions prior to 8.8.2, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be readable. Additionally, with any ZkACLProvider, if the security.json is already present, Solr will not automatically update the ACLs.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Solr before 8.8.2 misconfigures ZooKeeper ACLs on the security.json znode, allowing unauthorized read access to the security configuration.
Vulnerability
Apache Solr versions prior to 8.8.2, when configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, fail to treat security.json as a sensitive path. If an optional read-only user is configured, that user can read the znode. Additionally, with any ZkACLProvider, if security.json already exists, Solr does not automatically update its ACLs during startup [1][2].
Exploitation
For exploitation, an attacker must have network access to the ZooKeeper ensemble and have credentials for a read-only digest user (configured via -DzkDigestReadonlyUsername). If the system is started without pre-existing security.json, the znode is created with ACLs granting read access to that read-only user. The attacker can then authenticate as the read-only user and read the security.json znode contents. No additional authentication to Solr itself is required for this read operation on ZooKeeper [2].
Impact
Successful exploitation allows the attacker to read the security.json file, which may contain sensitive data such as authentication realm configurations and, in some implementations, hashed credentials. While the hashing algorithm used by Solr is not computationally slow (like bcrypt), the exposure of these hashes could facilitate offline brute-force attacks, leading to further compromise of the Solr authentication mechanism. The confidentiality of the security configuration is breached [2].
Mitigation
Upgrade to Apache Solr version 8.8.2 or later, which was released concurrently with the CVE publication (2021-04-13) [1]. In the fixed version, Solr correctly sets ACLs on the security.json znode during startup and restricts read access from the read-only user. No workaround is explicitly documented; the upgrade is the recommended mitigation. The vulnerability is also tracked under SOLR-15249 in the Apache Solr issue tracker [2].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.solr:solr-coreMaven | < 8.8.2 | 8.8.2 |
Affected products
3- osv-coords2 versions
< 8.8.2+ 1 more
- (no CPE)range: < 8.8.2
- (no CPE)range: < 8.8.2
- Apache Software Foundation/Apache Solrv5Range: Apache Solr
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
26- github.com/advisories/GHSA-jgcr-fg3g-qvw8ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2021-29262ghsaADVISORY
- issues.apache.org/jira/browse/SOLR-15249ghsaWEB
- lists.apache.org/thread.html/r1171f6417eeb6d5e1206d53e2b2ff2d6ee14026f8b595ef7d8a33b79%40%3Coak-issues.jackrabbit.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r1171f6417eeb6d5e1206d53e2b2ff2d6ee14026f8b595ef7d8a33b79@%3Coak-issues.jackrabbit.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r1e92a2eff6c47a65c4a6e95e809a9707181de76f8062403a0bea1012%40%3Coak-issues.jackrabbit.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r1e92a2eff6c47a65c4a6e95e809a9707181de76f8062403a0bea1012@%3Coak-issues.jackrabbit.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r51b29ff62060b67bc9999ded5e252b36b09311fe5a02d27f6de3e4d3%40%3Coak-issues.jackrabbit.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r51b29ff62060b67bc9999ded5e252b36b09311fe5a02d27f6de3e4d3@%3Coak-issues.jackrabbit.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r536da4c4e4e406f7843461cc754a3d0a3fe575aa576e2b71a9cd57d0%40%3Cannounce.apache.org%3Eghsax_refsource_MISCWEB
- lists.apache.org/thread.html/r7151081abab92a827a607205c4260b0a3d22280b52d15bc909177608%40%3Coak-issues.jackrabbit.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r7151081abab92a827a607205c4260b0a3d22280b52d15bc909177608@%3Coak-issues.jackrabbit.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r8d35eeb9a470d2682b5bcf3be0b8942faa7e28f9ca5861c058d17fff%40%3Coak-issues.jackrabbit.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r8d35eeb9a470d2682b5bcf3be0b8942faa7e28f9ca5861c058d17fff@%3Coak-issues.jackrabbit.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r9c4ce6903218c92ef2583070e64af5a69e483821c4b3016dc41e3c6f%40%3Coak-issues.jackrabbit.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/r9c4ce6903218c92ef2583070e64af5a69e483821c4b3016dc41e3c6f@%3Coak-issues.jackrabbit.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rb6db683903174eaa44ec80cc118a38574319b0d4181f36b61ee6278f%40%3Cdev.jackrabbit.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rb6db683903174eaa44ec80cc118a38574319b0d4181f36b61ee6278f@%3Cdev.jackrabbit.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rbc680cbfd745f22d182158217428a296e8e398cde16f3f428fe4bddc%40%3Coak-issues.jackrabbit.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rbc680cbfd745f22d182158217428a296e8e398cde16f3f428fe4bddc@%3Coak-issues.jackrabbit.apache.org%3EghsaWEB
- lists.apache.org/thread.html/rd85f87e559ee27e9c69795e3ad93a77621895e0328ea3df41d711d72%40%3Coak-commits.jackrabbit.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/rd85f87e559ee27e9c69795e3ad93a77621895e0328ea3df41d711d72@%3Coak-commits.jackrabbit.apache.org%3EghsaWEB
- lists.apache.org/thread.html/ref84e60192f4bdc3206b247f260513e8d4e71f3e200792f75386d07a%40%3Cdev.jackrabbit.apache.org%3Emitremailing-listx_refsource_MLIST
- lists.apache.org/thread.html/ref84e60192f4bdc3206b247f260513e8d4e71f3e200792f75386d07a@%3Cdev.jackrabbit.apache.org%3EghsaWEB
- security.netapp.com/advisory/ntap-20210604-0009ghsaWEB
- security.netapp.com/advisory/ntap-20210604-0009/mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.