This is an automated email from the ASF dual-hosted git repository.
git-site-role pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/solr-site.git
The following commit(s) were added to refs/heads/asf-staging by this push:
new a3431aa4f Automatic Site Publish by Buildbot
a3431aa4f is described below
commit a3431aa4f770637b5f400c3c19f83c21ef6ab0f4
Author: buildbot <[email protected]>
AuthorDate: Fri Jan 12 19:53:36 2024 +0000
Automatic Site Publish by Buildbot
---
output/feeds/all.atom.xml | 2 +-
output/feeds/solr/security.atom.xml | 2 +-
output/news.html | 4 ++--
output/security.html | 6 +++---
4 files changed, 7 insertions(+), 7 deletions(-)
diff --git a/output/feeds/all.atom.xml b/output/feeds/all.atom.xml
index 291989a92..059e8b582 100644
--- a/output/feeds/all.atom.xml
+++ b/output/feeds/all.atom.xml
@@ -1,5 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
-<feed xmlns="http://www.w3.org/2005/Atom"><title>Apache Solr</title><link
href="/" rel="alternate"></link><link href="/feeds/all.atom.xml"
rel="self"></link><id>/</id><updated>2024-01-12T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>Apache
Solr allows read access to host environment variables</title><link
href="/apache-solr-allows-read-access-to-host-environment-variables.html"
rel="alternate"></link><published>2024-01-12T00:00:00+00:00</published><updat
[...]
+<feed xmlns="http://www.w3.org/2005/Atom"><title>Apache Solr</title><link
href="/" rel="alternate"></link><link href="/feeds/all.atom.xml"
rel="self"></link><id>/</id><updated>2024-01-12T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>CVE-2023-50290:
Apache Solr allows read access to host environment variables</title><link
href="/cve-2023-50290-apache-solr-allows-read-access-to-host-environment-variables.html"
rel="alternate"></link><published>2024-01-12T0 [...]
Solr 9.0 to 9.2.1</p>
<p><strong>Description:</strong>
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in
Apache Solr.
diff --git a/output/feeds/solr/security.atom.xml
b/output/feeds/solr/security.atom.xml
index 0af2cbc42..acb1eef82 100644
--- a/output/feeds/solr/security.atom.xml
+++ b/output/feeds/solr/security.atom.xml
@@ -1,5 +1,5 @@
<?xml version="1.0" encoding="utf-8"?>
-<feed xmlns="http://www.w3.org/2005/Atom"><title>Apache Solr -
solr/security</title><link href="/" rel="alternate"></link><link
href="/feeds/solr/security.atom.xml"
rel="self"></link><id>/</id><updated>2024-01-12T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>Apache
Solr allows read access to host environment variables</title><link
href="/apache-solr-allows-read-access-to-host-environment-variables.html"
rel="alternate"></link><published>2024-01-12T00:00: [...]
+<feed xmlns="http://www.w3.org/2005/Atom"><title>Apache Solr -
solr/security</title><link href="/" rel="alternate"></link><link
href="/feeds/solr/security.atom.xml"
rel="self"></link><id>/</id><updated>2024-01-12T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>CVE-2023-50290:
Apache Solr allows read access to host environment variables</title><link
href="/cve-2023-50290-apache-solr-allows-read-access-to-host-environment-variables.html"
rel="alternate"></li [...]
Solr 9.0 to 9.2.1</p>
<p><strong>Description:</strong>
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in
Apache Solr.
diff --git a/output/news.html b/output/news.html
index c1d95dcd2..aefa4ebf9 100644
--- a/output/news.html
+++ b/output/news.html
@@ -132,8 +132,8 @@
<h1 id="solr-news">Solr<sup>™</sup> News<a class="headerlink"
href="#solr-news" title="Permanent link">¶</a></h1>
<p>You may also read these news as an <a
href="/feeds/solr/news.atom.xml">ATOM feed</a>.</p>
- <h2 id="apache-solr-allows-read-access-to-host-environment-variables">12
January 2024, Apache Solr allows read access to host environment variables
- <a class="headerlink"
href="#apache-solr-allows-read-access-to-host-environment-variables"
title="Permanent link">¶</a>
+ <h2
id="cve-2023-50290-apache-solr-allows-read-access-to-host-environment-variables">12
January 2024, CVE-2023-50290: Apache Solr allows read access to host
environment variables
+ <a class="headerlink"
href="#cve-2023-50290-apache-solr-allows-read-access-to-host-environment-variables"
title="Permanent link">¶</a>
</h2>
<p><strong>Versions Affected:</strong>
Solr 9.0 to 9.2.1</p>
diff --git a/output/security.html b/output/security.html
index a6b42b78e..c12cc323d 100644
--- a/output/security.html
+++ b/output/security.html
@@ -190,7 +190,7 @@ with you to see if we can provide this information in other
variations or format
<tr>
<td><a
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50290">CVE-2023-50290</a></td>
<td>2024-01-12</td>
- <td><a
href="#apache-solr-allows-read-access-to-host-environment-variables">Apache
Solr allows read access to host environment variables</a></td>
+ <td><a
href="#cve-2023-50290-apache-solr-allows-read-access-to-host-environment-variables">Apache
Solr allows read access to host environment variables</a></td>
</tr>
<tr>
<td><a
href="https://nvd.nist.gov/vuln/detail/CVE-2022-39135">CVE-2022-39135</a></td>
@@ -264,8 +264,8 @@ with you to see if we can provide this information in other
variations or format
</tr>
</table>
- <h2
id="apache-solr-allows-read-access-to-host-environment-variables">2024-01-12,
Apache Solr allows read access to host environment variables
- <a class="headerlink"
href="#apache-solr-allows-read-access-to-host-environment-variables"
title="Permanent link">¶</a>
+ <h2
id="cve-2023-50290-apache-solr-allows-read-access-to-host-environment-variables">2024-01-12,
CVE-2023-50290: Apache Solr allows read access to host environment variables
+ <a class="headerlink"
href="#cve-2023-50290-apache-solr-allows-read-access-to-host-environment-variables"
title="Permanent link">¶</a>
</h2>
<p><strong>Versions Affected:</strong>
Solr 9.0 to 9.2.1</p>