This vulnerability in Apache Solr 6.0.0 to 6.6.4 and 7.0.0 to 7.3.1 relates
to an XML external entity expansion (XXE) in Solr config files
(currency.xml, enumsConfig.xml referred from schema.xml, TIKA parsecontext
config file). In addition, Xinclude functionality provided in these config
files is also affected in a similar way. The vulnerability can be used as
XXE using file/ftp/http protocols in order to read arbitrary local files
from the Solr server or the internal network. The manipulated files can be
uploaded as configsets using Solr's API, allowing to exploit that
Upstream:not-affected (debian: Do not allow to upload configsets via the API)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needs-triage)
Ubuntu 16.04 LTS (Xenial Xerus):needs-triage
Ubuntu 18.04 LTS (Bionic Beaver):needs-triage
Ubuntu 19.04 (Disco Dingo):needs-triage
Ubuntu 19.10 (Eoan):needs-triage
More Information

Updated: 2019-09-19 14:49:28 UTC (commit d32ebc32606b9517c6fa7d65a15441e2a57a6de5)