VYPR
High severityNVD Advisory· Published Apr 13, 2021· Updated Aug 3, 2024

Misapplied Zookeeper ACLs can result in leakage of configured authentication and authorization settings

CVE-2021-29262

Description

When starting Apache Solr versions prior to 8.8.2, configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, if the optional read-only user is configured then Solr would not treat that node as a sensitive path and would allow it to be readable. Additionally, with any ZkACLProvider, if the security.json is already present, Solr will not automatically update the ACLs.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Solr before 8.8.2 misconfigures ZooKeeper ACLs on the security.json znode, allowing unauthorized read access to the security configuration.

Vulnerability

Apache Solr versions prior to 8.8.2, when configured with the SaslZkACLProvider or VMParamsAllAndReadonlyDigestZkACLProvider and no existing security.json znode, fail to treat security.json as a sensitive path. If an optional read-only user is configured, that user can read the znode. Additionally, with any ZkACLProvider, if security.json already exists, Solr does not automatically update its ACLs during startup [1][2].

Exploitation

For exploitation, an attacker must have network access to the ZooKeeper ensemble and have credentials for a read-only digest user (configured via -DzkDigestReadonlyUsername). If the system is started without pre-existing security.json, the znode is created with ACLs granting read access to that read-only user. The attacker can then authenticate as the read-only user and read the security.json znode contents. No additional authentication to Solr itself is required for this read operation on ZooKeeper [2].

Impact

Successful exploitation allows the attacker to read the security.json file, which may contain sensitive data such as authentication realm configurations and, in some implementations, hashed credentials. While the hashing algorithm used by Solr is not computationally slow (like bcrypt), the exposure of these hashes could facilitate offline brute-force attacks, leading to further compromise of the Solr authentication mechanism. The confidentiality of the security configuration is breached [2].

Mitigation

Upgrade to Apache Solr version 8.8.2 or later, which was released concurrently with the CVE publication (2021-04-13) [1]. In the fixed version, Solr correctly sets ACLs on the security.json znode during startup and restricts read access from the read-only user. No workaround is explicitly documented; the upgrade is the recommended mitigation. The vulnerability is also tracked under SOLR-15249 in the Apache Solr issue tracker [2].

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.solr:solr-coreMaven
< 8.8.28.8.2

Affected products

3

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

26

News mentions

0

No linked articles in our index yet.