This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/solr-site.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new 671dcbebb Automatic Site Publish by Buildbot
671dcbebb is described below

commit 671dcbebb1e49e36a64abdb2dc56f667e313ff68
Author: buildbot <[email protected]>
AuthorDate: Fri Feb 9 17:14:02 2024 +0000

    Automatic Site Publish by Buildbot
---
 output/feeds/all.atom.xml           | 127 ++++++++++++++++-
 output/feeds/solr/security.atom.xml | 127 ++++++++++++++++-
 output/index.html                   |   2 +-
 output/news.html                    | 107 ++++++++++++++
 output/operator/index.html          |   2 +-
 output/security.html                | 276 +++++++++++++++++-------------------
 6 files changed, 492 insertions(+), 149 deletions(-)

diff --git a/output/feeds/all.atom.xml b/output/feeds/all.atom.xml
index 5198a5a14..38d98dd60 100644
--- a/output/feeds/all.atom.xml
+++ b/output/feeds/all.atom.xml
@@ -33,7 +33,132 @@
 &lt;p&gt;Please read CHANGES.txt for a full list of bugfixes:&lt;/p&gt;
 &lt;p&gt;&lt;a 
href="https://solr.apache.org/docs/8_11_3/changes/Changes.html"&gt;https://solr.apache.org/docs/8_11_3/changes/Changes.html&lt;/a&gt;&lt;/p&gt;
 &lt;p&gt;Solr 8.11.3 also includes bugfixes in the corresponding Apache Lucene 
release:&lt;/p&gt;
-&lt;p&gt;&lt;a 
href="https://lucene.apache.org/core/8_11_3/changes/Changes.html"&gt;https://lucene.apache.org/core/8_11_3/changes/Changes.html&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/news"></category></entry><entry><title>Apache Solr™ 9.4.1 
available</title><link href="/apache-solrtm-941-available.html" 
rel="alternate"></link><published>2024-01-18T00:00:00+00:00</published><updated>2024-01-18T00:00:00+00:00</updated><author><name>Solr
 Developers</name></author><id>tag:None,2024 [...]
+&lt;p&gt;&lt;a 
href="https://lucene.apache.org/core/8_11_3/changes/Changes.html"&gt;https://lucene.apache.org/core/8_11_3/changes/Changes.html&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/news"></category></entry><entry><title>CVE-2023-50291: Apache Solr 
can leak certain passwords due to System Property redaction logic 
inconsistencies</title><link 
href="/cve-2023-50291-apache-solr-can-leak-certain-passwords-due-to-system-property-redaction-logic-inconsistencies.html"
 rel="alternate" [...]
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.3.0&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Insufficiently Protected Credentials vulnerability in Apache Solr.&lt;/p&gt;
+&lt;p&gt;This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 
before 9.3 …&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.3.0&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Insufficiently Protected Credentials vulnerability in Apache Solr.&lt;/p&gt;
+&lt;p&gt;This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 
before 9.3.0.
+One of the two endpoints that publishes the Solr process' Java system 
properties, /admin/info/properties, was only setup to hide system properties 
that had "password" contained in the name.
+There are a number of sensitive system properties, such as "basicauth" and 
"aws.secretKey" do not contain "password", thus their values were published via 
the "/admin/info/properties" endpoint.
+This endpoint populates the list of System Properties on the home screen of 
the Solr Admin page, making the exposed credentials visible in the UI.&lt;/p&gt;
+&lt;p&gt;This /admin/info/properties endpoint is protected under the 
"config-read" permission.
+Therefore, Solr Clouds with Authorization enabled will only be vulnerable 
through logged-in users that have the "config-read" permission.
+Users are recommended to upgrade to version 9.3.0 or 8.11.3, which fixes the 
issue.
+A single option now controls hiding Java system property for all endpoints, 
"-Dsolr.hiddenSysProps".
+By default all known sensitive properties are hidden (including 
"-Dbasicauth"), as well as any property with a name containing "secret" or 
"password".&lt;/p&gt;
+&lt;p&gt;Users who cannot upgrade can also use the following Java system 
property to fix the issue:&lt;br&gt;
+&lt;code&gt;-Dsolr.redaction.system.pattern=".*(password|secret|basicauth).*"&lt;/code&gt;&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
+Users are recommended to upgrade to version 8.11.3, 9.3.0 or later, which has 
consistent systemProperty redaction logic.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
+Michael Taggart (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-16809"&gt;SOLR-16809&lt;/a&gt;&lt;br&gt;
+CVE - &lt;a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50291"&gt;CVE-2023-50291&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>CVE-2023-50292: Apache 
Solr Schema Designer blindly "trusts" all configsets, possibly leading to RCE 
by unauthenticated users</title><link 
href="/cve-2023-50292-apache-solr-schema-designer-blindly-trusts-all-configsets-possibly-leading-to-rce-by-unauthenticated-users.html"
 rel="alternate"></link><published>2024-0 [...]
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.3.0&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Incorrect Permission Assignment for Critical Resource, Improper Control of 
Dynamically-Managed Code Resources vulnerability in Apache Solr.&lt;/p&gt;
+&lt;p&gt;This issue affects Apache Solr: from 8.10.0 through 8 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.3.0&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Incorrect Permission Assignment for Critical Resource, Improper Control of 
Dynamically-Managed Code Resources vulnerability in Apache Solr.&lt;/p&gt;
+&lt;p&gt;This issue affects Apache Solr: from 8.10.0 through 8.11.2, from 
9.0.0 before 9.3.0.&lt;/p&gt;
+&lt;p&gt;The Schema Designer was introduced to allow users to more easily 
configure and test new Schemas and configSets.
+However, when the feature was created, the "trust" (authentication) of these 
configSets was not considered.
+External library loading is only available to configSets that are "trusted" 
(created by authenticated users), thus non-authenticated users are unable to 
perform Remote Code Execution.
+Since the Schema Designer loaded configSets without taking their "trust" into 
account, configSets that were created by unauthenticated users were allowed to 
load external libraries when used in the Schema Designer.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
+Users are recommended to upgrade to version 8.11.3, 9.3.0 or later.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
+Skay (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-16777"&gt;SOLR-16777&lt;/a&gt;&lt;br&gt;
+CVE - &lt;a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50292"&gt;CVE-2023-50292&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>CVE-2023-50298: Apache 
Solr can expose ZooKeeper credentials via Streaming Expressions</title><link 
href="/cve-2023-50298-apache-solr-can-expose-zookeeper-credentials-via-streaming-expressions.html"
 
rel="alternate"></link><published>2024-02-08T00:00:00+00:00</published><updated>2024-02-08T00:00:00+00:00</updated>
 [...]
+Low&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.4.1&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Exposure of Sensitive Information to an Unauthorized Actor vulnerability in 
Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
+Low&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.4.1&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Exposure of Sensitive Information to an Unauthorized Actor vulnerability in 
Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 
9.0.0 before 9.4.1.&lt;/p&gt;
+&lt;p&gt;Solr Streaming Expressions allows users to extract data from other 
Solr Clouds, using a "zkHost" parameter.
+When original SolrCloud is setup to use ZooKeeper credentials and ACLs, they 
will be sent to whatever "zkHost" the user provides.
+An attacker could setup a server to mock ZooKeeper, that accepts ZooKeeper 
requests with credentials and ACLs and extracts the sensitive information,
+then send a streaming expression using the mock server's address in "zkHost".
+Streaming Expressions are exposed via the "/streaming" handler, with "read" 
permissions.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
+Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the 
issue.
+From these versions on, only zkHost values that have the same server address 
(regardless of chroot), will use the given ZooKeeper credentials and ACLs when 
connecting.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
+Qing Xu (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-17098"&gt;SOLR-17098&lt;/a&gt;&lt;br&gt;
+CVE - &lt;a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50298"&gt;CVE-2023-50298&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>CVE-2023-50386: Apache 
Solr: Backup/Restore APIs allow for deployment of executables in malicious 
ConfigSets</title><link 
href="/cve-2023-50386-apache-solr-backuprestore-apis-allow-for-deployment-of-executables-in-malicious-configsets.html"
 rel="alternate"></link><published>2024-02-08T00:00:00+00:00</published><u [...]
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.4.1&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of 
File with Dangerous Type, Inclusion of Functionality from Untrusted Control 
Sphere vulnerability in Apache Solr.This issue affects 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.4.1&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of 
File with Dangerous Type, Inclusion of Functionality from Untrusted Control 
Sphere vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 
through 8.11.2, from 9.0.0 before 9.4.1.&lt;/p&gt;
+&lt;p&gt;In the affected versions, Solr ConfigSets accepted Java jar and class 
files to be uploaded through the ConfigSets API.
+When backing up Solr Collections, these configSet files would be saved to disk 
when using the LocalFileSystemRepository (the default for backups).
+If the backup was saved to a directory that Solr uses in its 
ClassPath/ClassLoaders, then the jar and class files would be available to use 
with any ConfigSet, trusted or untrusted.&lt;/p&gt;
+&lt;p&gt;When Solr is run in a secure way (Authorization enabled), as is 
strongly suggested, this vulnerability is limited to extending the Backup 
permissions with the ability to add libraries.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
+Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the 
issue.
+In these versions, the following protections have been added:&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Users are no longer able to upload files to a configSet that could 
be executed via a Java ClassLoader.&lt;/li&gt;
+&lt;li&gt;The Backup API restricts saving backups to directories that are used 
in the ClassLoader.&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
+L3yx (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-16949"&gt;SOLR-16949&lt;/a&gt;&lt;br&gt;
+CVE - &lt;a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50386"&gt;CVE-2023-50386&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>Apache Solr™ 9.4.1 
available</title><link href="/apache-solrtm-941-available.html" 
rel="alternate"></link><published>2024-01-18T00:00:00+00:00</published><updated>2024-01-18T00:00:00+00:00</updated><author><name>Solr
 
Developers</name></author><id>tag:None,2024-01-18:/apache-solrtm-941-available.html</id><summary
  [...]
 &lt;p&gt;Solr is the popular, blazing fast, open source NoSQL search platform 
from the Apache Solr project. Its major features include powerful full-text 
search, hit highlighting, faceted search, dynamic clustering, database 
integration, rich document handling, and …&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;The Solr PMC is pleased to announce the release of Apache 
Solr 9.4.1.&lt;/p&gt;
 &lt;p&gt;Solr is the popular, blazing fast, open source NoSQL search platform 
from the Apache Solr project. Its major features include powerful full-text 
search, hit highlighting, faceted search, dynamic clustering, database 
integration, rich document handling, and geospatial search. Solr is highly 
scalable, providing fault tolerant distributed search and indexing, and powers 
the search and navigation features of many of the world's largest internet 
sites.&lt;/p&gt;
 &lt;p&gt;Solr 9.4.1 is available for immediate download at:&lt;/p&gt;
diff --git a/output/feeds/solr/security.atom.xml 
b/output/feeds/solr/security.atom.xml
index 305bb45a6..afc094cf4 100644
--- a/output/feeds/solr/security.atom.xml
+++ b/output/feeds/solr/security.atom.xml
@@ -1,5 +1,130 @@
 <?xml version="1.0" encoding="utf-8"?>
-<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr - 
solr/security</title><link href="/" rel="alternate"></link><link 
href="/feeds/solr/security.atom.xml" 
rel="self"></link><id>/</id><updated>2024-01-12T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>CVE-2023-50290:
 Apache Solr allows read access to host environment variables</title><link 
href="/cve-2023-50290-apache-solr-allows-read-access-to-host-environment-variables.html"
 rel="alternate"></li [...]
+<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr - 
solr/security</title><link href="/" rel="alternate"></link><link 
href="/feeds/solr/security.atom.xml" 
rel="self"></link><id>/</id><updated>2024-02-08T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>CVE-2023-50291:
 Apache Solr can leak certain passwords due to System Property redaction logic 
inconsistencies</title><link 
href="/cve-2023-50291-apache-solr-can-leak-certain-passwords-due-to-system-p 
[...]
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.3.0&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Insufficiently Protected Credentials vulnerability in Apache Solr.&lt;/p&gt;
+&lt;p&gt;This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 
before 9.3 …&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.3.0&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Insufficiently Protected Credentials vulnerability in Apache Solr.&lt;/p&gt;
+&lt;p&gt;This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 
before 9.3.0.
+One of the two endpoints that publishes the Solr process' Java system 
properties, /admin/info/properties, was only setup to hide system properties 
that had "password" contained in the name.
+There are a number of sensitive system properties, such as "basicauth" and 
"aws.secretKey" do not contain "password", thus their values were published via 
the "/admin/info/properties" endpoint.
+This endpoint populates the list of System Properties on the home screen of 
the Solr Admin page, making the exposed credentials visible in the UI.&lt;/p&gt;
+&lt;p&gt;This /admin/info/properties endpoint is protected under the 
"config-read" permission.
+Therefore, Solr Clouds with Authorization enabled will only be vulnerable 
through logged-in users that have the "config-read" permission.
+Users are recommended to upgrade to version 9.3.0 or 8.11.3, which fixes the 
issue.
+A single option now controls hiding Java system property for all endpoints, 
"-Dsolr.hiddenSysProps".
+By default all known sensitive properties are hidden (including 
"-Dbasicauth"), as well as any property with a name containing "secret" or 
"password".&lt;/p&gt;
+&lt;p&gt;Users who cannot upgrade can also use the following Java system 
property to fix the issue:&lt;br&gt;
+&lt;code&gt;-Dsolr.redaction.system.pattern=".*(password|secret|basicauth).*"&lt;/code&gt;&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
+Users are recommended to upgrade to version 8.11.3, 9.3.0 or later, which has 
consistent systemProperty redaction logic.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
+Michael Taggart (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-16809"&gt;SOLR-16809&lt;/a&gt;&lt;br&gt;
+CVE - &lt;a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50291"&gt;CVE-2023-50291&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>CVE-2023-50292: Apache 
Solr Schema Designer blindly "trusts" all configsets, possibly leading to RCE 
by unauthenticated users</title><link 
href="/cve-2023-50292-apache-solr-schema-designer-blindly-trusts-all-configsets-possibly-leading-to-rce-by-unauthenticated-users.html"
 rel="alternate"></link><published>2024-0 [...]
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.3.0&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Incorrect Permission Assignment for Critical Resource, Improper Control of 
Dynamically-Managed Code Resources vulnerability in Apache Solr.&lt;/p&gt;
+&lt;p&gt;This issue affects Apache Solr: from 8.10.0 through 8 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.3.0&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Incorrect Permission Assignment for Critical Resource, Improper Control of 
Dynamically-Managed Code Resources vulnerability in Apache Solr.&lt;/p&gt;
+&lt;p&gt;This issue affects Apache Solr: from 8.10.0 through 8.11.2, from 
9.0.0 before 9.3.0.&lt;/p&gt;
+&lt;p&gt;The Schema Designer was introduced to allow users to more easily 
configure and test new Schemas and configSets.
+However, when the feature was created, the "trust" (authentication) of these 
configSets was not considered.
+External library loading is only available to configSets that are "trusted" 
(created by authenticated users), thus non-authenticated users are unable to 
perform Remote Code Execution.
+Since the Schema Designer loaded configSets without taking their "trust" into 
account, configSets that were created by unauthenticated users were allowed to 
load external libraries when used in the Schema Designer.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
+Users are recommended to upgrade to version 8.11.3, 9.3.0 or later.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
+Skay (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-16777"&gt;SOLR-16777&lt;/a&gt;&lt;br&gt;
+CVE - &lt;a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50292"&gt;CVE-2023-50292&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>CVE-2023-50298: Apache 
Solr can expose ZooKeeper credentials via Streaming Expressions</title><link 
href="/cve-2023-50298-apache-solr-can-expose-zookeeper-credentials-via-streaming-expressions.html"
 
rel="alternate"></link><published>2024-02-08T00:00:00+00:00</published><updated>2024-02-08T00:00:00+00:00</updated>
 [...]
+Low&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.4.1&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Exposure of Sensitive Information to an Unauthorized Actor vulnerability in 
Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
+Low&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.4.1&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Exposure of Sensitive Information to an Unauthorized Actor vulnerability in 
Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 
9.0.0 before 9.4.1.&lt;/p&gt;
+&lt;p&gt;Solr Streaming Expressions allows users to extract data from other 
Solr Clouds, using a "zkHost" parameter.
+When original SolrCloud is setup to use ZooKeeper credentials and ACLs, they 
will be sent to whatever "zkHost" the user provides.
+An attacker could setup a server to mock ZooKeeper, that accepts ZooKeeper 
requests with credentials and ACLs and extracts the sensitive information,
+then send a streaming expression using the mock server's address in "zkHost".
+Streaming Expressions are exposed via the "/streaming" handler, with "read" 
permissions.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
+Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the 
issue.
+From these versions on, only zkHost values that have the same server address 
(regardless of chroot), will use the given ZooKeeper credentials and ACLs when 
connecting.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
+Qing Xu (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-17098"&gt;SOLR-17098&lt;/a&gt;&lt;br&gt;
+CVE - &lt;a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50298"&gt;CVE-2023-50298&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>CVE-2023-50386: Apache 
Solr: Backup/Restore APIs allow for deployment of executables in malicious 
ConfigSets</title><link 
href="/cve-2023-50386-apache-solr-backuprestore-apis-allow-for-deployment-of-executables-in-malicious-configsets.html"
 rel="alternate"></link><published>2024-02-08T00:00:00+00:00</published><u [...]
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.4.1&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of 
File with Dangerous Type, Inclusion of Functionality from Untrusted Control 
Sphere vulnerability in Apache Solr.This issue affects 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Apache Solr 6.0.0 through 8.11.2&lt;/li&gt;
+&lt;li&gt;Apache Solr 9.0.0 before 9.4.1&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of 
File with Dangerous Type, Inclusion of Functionality from Untrusted Control 
Sphere vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 
through 8.11.2, from 9.0.0 before 9.4.1.&lt;/p&gt;
+&lt;p&gt;In the affected versions, Solr ConfigSets accepted Java jar and class 
files to be uploaded through the ConfigSets API.
+When backing up Solr Collections, these configSet files would be saved to disk 
when using the LocalFileSystemRepository (the default for backups).
+If the backup was saved to a directory that Solr uses in its 
ClassPath/ClassLoaders, then the jar and class files would be available to use 
with any ConfigSet, trusted or untrusted.&lt;/p&gt;
+&lt;p&gt;When Solr is run in a secure way (Authorization enabled), as is 
strongly suggested, this vulnerability is limited to extending the Backup 
permissions with the ability to add libraries.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
+Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the 
issue.
+In these versions, the following protections have been added:&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;Users are no longer able to upload files to a configSet that could 
be executed via a Java ClassLoader.&lt;/li&gt;
+&lt;li&gt;The Backup API restricts saving backups to directories that are used 
in the ClassLoader.&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;
+L3yx (reporter)&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
+JIRA - &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-16949"&gt;SOLR-16949&lt;/a&gt;&lt;br&gt;
+CVE - &lt;a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50386"&gt;CVE-2023-50386&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>CVE-2023-50290: Apache 
Solr allows read access to host environment variables</title><link 
href="/cve-2023-50290-apache-solr-allows-read-access-to-host-environment-variables.html"
 
rel="alternate"></link><published>2024-01-12T00:00:00+00:00</published><updated>2024-01-12T00:00:00+00:00</updated><author><name>Solr
 D [...]
 Important&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
 Solr 9.0 to 9.2.1&lt;/p&gt;
diff --git a/output/index.html b/output/index.html
index bda38eedf..df89d7eb4 100644
--- a/output/index.html
+++ b/output/index.html
@@ -112,7 +112,7 @@
 </div>
 
 <div class="header-fill"></div>
-<section class="security" latest-date="2024-01-12">
+<section class="security" latest-date="2024-02-08">
   <div class="row">
     <div class="large-12 columns text-center">
       <h2><a href="security.html">&#x26A0; There are recent security 
announcements. Read more on the Security page.</a></h2>
diff --git a/output/news.html b/output/news.html
index ba104acbf..4d194f396 100644
--- a/output/news.html
+++ b/output/news.html
@@ -169,6 +169,113 @@
 <p><a 
href="https://solr.apache.org/docs/8_11_3/changes/Changes.html";>https://solr.apache.org/docs/8_11_3/changes/Changes.html</a></p>
 <p>Solr 8.11.3 also includes bugfixes in the corresponding Apache Lucene 
release:</p>
 <p><a 
href="https://lucene.apache.org/core/8_11_3/changes/Changes.html";>https://lucene.apache.org/core/8_11_3/changes/Changes.html</a></p>
+  <h2 
id="cve-2023-50291-apache-solr-can-leak-certain-passwords-due-to-system-property-redaction-logic-inconsistencies">8
 February 2024, CVE-2023-50291: Apache Solr can leak certain passwords due to 
System Property redaction logic inconsistencies
+    <a class="headerlink" 
href="#cve-2023-50291-apache-solr-can-leak-certain-passwords-due-to-system-property-redaction-logic-inconsistencies"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity:</strong><br>
+Moderate</p>
+<p><strong>Versions Affected:</strong></p>
+<ul>
+<li>Apache Solr 6.0.0 through 8.11.2</li>
+<li>Apache Solr 9.0.0 before 9.3.0</li>
+</ul>
+<p><strong>Description:</strong><br>
+Insufficiently Protected Credentials vulnerability in Apache Solr.</p>
+<p>This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 
before 9.3.0.
+One of the two endpoints that publishes the Solr process' Java system 
properties, /admin/info/properties, was only setup to hide system properties 
that had "password" contained in the name.
+There are a number of sensitive system properties, such as "basicauth" and 
"aws.secretKey" do not contain "password", thus their values were published via 
the "/admin/info/properties" endpoint.
+This endpoint populates the list of System Properties on the home screen of 
the Solr Admin page, making the exposed credentials visible in the UI.</p>
+<p>This /admin/info/properties endpoint is protected under the "config-read" 
permission.
+Therefore, Solr Clouds with Authorization enabled will only be vulnerable 
through logged-in users that have the "config-read" permission.
+Users are recommended to upgrade to version 9.3.0 or 8.11.3, which fixes the 
issue.
+A single option now controls hiding Java system property for all endpoints, 
"-Dsolr.hiddenSysProps".
+By default all known sensitive properties are hidden (including 
"-Dbasicauth"), as well as any property with a name containing "secret" or 
"password".</p>
+<p>Users who cannot upgrade can also use the following Java system property to 
fix the issue:<br>
+<code>-Dsolr.redaction.system.pattern=".*(password|secret|basicauth).*"</code></p>
+<p><strong>Mitigation:</strong><br>
+Users are recommended to upgrade to version 8.11.3, 9.3.0 or later, which has 
consistent systemProperty redaction logic.</p>
+<p><strong>Credit:</strong>
+Michael Taggart (reporter)</p>
+<p><strong>References:</strong><br>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-16809";>SOLR-16809</a><br>
+CVE - <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50291";>CVE-2023-50291</a></p>
+  <h2 
id="cve-2023-50292-apache-solr-schema-designer-blindly-trusts-all-configsets-possibly-leading-to-rce-by-unauthenticated-users">8
 February 2024, CVE-2023-50292: Apache Solr Schema Designer blindly "trusts" 
all configsets, possibly leading to RCE by unauthenticated users
+    <a class="headerlink" 
href="#cve-2023-50292-apache-solr-schema-designer-blindly-trusts-all-configsets-possibly-leading-to-rce-by-unauthenticated-users"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity:</strong><br>
+Moderate</p>
+<p><strong>Versions Affected:</strong></p>
+<ul>
+<li>Apache Solr 6.0.0 through 8.11.2</li>
+<li>Apache Solr 9.0.0 before 9.3.0</li>
+</ul>
+<p><strong>Description:</strong><br>
+Incorrect Permission Assignment for Critical Resource, Improper Control of 
Dynamically-Managed Code Resources vulnerability in Apache Solr.</p>
+<p>This issue affects Apache Solr: from 8.10.0 through 8.11.2, from 9.0.0 
before 9.3.0.</p>
+<p>The Schema Designer was introduced to allow users to more easily configure 
and test new Schemas and configSets.
+However, when the feature was created, the "trust" (authentication) of these 
configSets was not considered.
+External library loading is only available to configSets that are "trusted" 
(created by authenticated users), thus non-authenticated users are unable to 
perform Remote Code Execution.
+Since the Schema Designer loaded configSets without taking their "trust" into 
account, configSets that were created by unauthenticated users were allowed to 
load external libraries when used in the Schema Designer.</p>
+<p><strong>Mitigation:</strong><br>
+Users are recommended to upgrade to version 8.11.3, 9.3.0 or later.</p>
+<p><strong>Credit:</strong>
+Skay (reporter)</p>
+<p><strong>References:</strong><br>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-16777";>SOLR-16777</a><br>
+CVE - <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50292";>CVE-2023-50292</a></p>
+  <h2 
id="cve-2023-50298-apache-solr-can-expose-zookeeper-credentials-via-streaming-expressions">8
 February 2024, CVE-2023-50298: Apache Solr can expose ZooKeeper credentials 
via Streaming Expressions
+    <a class="headerlink" 
href="#cve-2023-50298-apache-solr-can-expose-zookeeper-credentials-via-streaming-expressions"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity:</strong><br>
+Low</p>
+<p><strong>Versions Affected:</strong></p>
+<ul>
+<li>Apache Solr 6.0.0 through 8.11.2</li>
+<li>Apache Solr 9.0.0 before 9.4.1</li>
+</ul>
+<p><strong>Description:</strong><br>
+Exposure of Sensitive Information to an Unauthorized Actor vulnerability in 
Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 
9.0.0 before 9.4.1.</p>
+<p>Solr Streaming Expressions allows users to extract data from other Solr 
Clouds, using a "zkHost" parameter.
+When original SolrCloud is setup to use ZooKeeper credentials and ACLs, they 
will be sent to whatever "zkHost" the user provides.
+An attacker could setup a server to mock ZooKeeper, that accepts ZooKeeper 
requests with credentials and ACLs and extracts the sensitive information,
+then send a streaming expression using the mock server's address in "zkHost".
+Streaming Expressions are exposed via the "/streaming" handler, with "read" 
permissions.</p>
+<p><strong>Mitigation:</strong><br>
+Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the 
issue.
+From these versions on, only zkHost values that have the same server address 
(regardless of chroot), will use the given ZooKeeper credentials and ACLs when 
connecting.</p>
+<p><strong>Credit:</strong>
+Qing Xu (reporter)</p>
+<p><strong>References:</strong><br>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-17098";>SOLR-17098</a><br>
+CVE - <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50298";>CVE-2023-50298</a></p>
+  <h2 
id="cve-2023-50386-apache-solr-backuprestore-apis-allow-for-deployment-of-executables-in-malicious-configsets">8
 February 2024, CVE-2023-50386: Apache Solr: Backup/Restore APIs allow for 
deployment of executables in malicious ConfigSets
+    <a class="headerlink" 
href="#cve-2023-50386-apache-solr-backuprestore-apis-allow-for-deployment-of-executables-in-malicious-configsets"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity:</strong><br>
+Moderate</p>
+<p><strong>Versions Affected:</strong></p>
+<ul>
+<li>Apache Solr 6.0.0 through 8.11.2</li>
+<li>Apache Solr 9.0.0 before 9.4.1</li>
+</ul>
+<p><strong>Description:</strong><br>
+Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of 
File with Dangerous Type, Inclusion of Functionality from Untrusted Control 
Sphere vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 
through 8.11.2, from 9.0.0 before 9.4.1.</p>
+<p>In the affected versions, Solr ConfigSets accepted Java jar and class files 
to be uploaded through the ConfigSets API.
+When backing up Solr Collections, these configSet files would be saved to disk 
when using the LocalFileSystemRepository (the default for backups).
+If the backup was saved to a directory that Solr uses in its 
ClassPath/ClassLoaders, then the jar and class files would be available to use 
with any ConfigSet, trusted or untrusted.</p>
+<p>When Solr is run in a secure way (Authorization enabled), as is strongly 
suggested, this vulnerability is limited to extending the Backup permissions 
with the ability to add libraries.</p>
+<p><strong>Mitigation:</strong><br>
+Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the 
issue.
+In these versions, the following protections have been added:</p>
+<ul>
+<li>Users are no longer able to upload files to a configSet that could be 
executed via a Java ClassLoader.</li>
+<li>The Backup API restricts saving backups to directories that are used in 
the ClassLoader.</li>
+</ul>
+<p><strong>Credit:</strong>
+L3yx (reporter)</p>
+<p><strong>References:</strong><br>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-16949";>SOLR-16949</a><br>
+CVE - <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50386";>CVE-2023-50386</a></p>
   <h2 id="apache-solrtm-941-available">18 January 2024, Apache Solr™ 9.4.1 
available
     <a class="headerlink" href="#apache-solrtm-941-available" title="Permanent 
link">¶</a>
   </h2>
diff --git a/output/operator/index.html b/output/operator/index.html
index 799fa1f73..22c42126c 100644
--- a/output/operator/index.html
+++ b/output/operator/index.html
@@ -107,7 +107,7 @@
 </div>
 
 <div class="header-fill"></div>
-<section class="security" latest-date="2024-01-12">
+<section class="security" latest-date="2024-02-08">
   <div class="row">
     <div class="large-12 columns text-center">
       <h2><a href="/security.html">&#x26A0; There are recent security 
announcements. Read more on the Solr Security page.</a></h2>
diff --git a/output/security.html b/output/security.html
index 80ef57c43..3ceee6be5 100644
--- a/output/security.html
+++ b/output/security.html
@@ -187,6 +187,26 @@ with you to see if we can provide this information in 
other variations or format
             <th width="95">Date</th>
             <th>Announcement</th>
         </tr>
+        <tr>
+            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50291";>CVE-2023-50291</a></td>
+            <td>2024-02-08</td>
+            <td><a 
href="#cve-2023-50291-apache-solr-can-leak-certain-passwords-due-to-system-property-redaction-logic-inconsistencies">Apache
 Solr can leak certain passwords due to System Property redaction logic 
inconsistencies</a></td>
+        </tr>
+        <tr>
+            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50292";>CVE-2023-50292</a></td>
+            <td>2024-02-08</td>
+            <td><a 
href="#cve-2023-50292-apache-solr-schema-designer-blindly-trusts-all-configsets-possibly-leading-to-rce-by-unauthenticated-users">Apache
 Solr Schema Designer blindly "trusts" all configsets, possibly leading to RCE 
by unauthenticated users</a></td>
+        </tr>
+        <tr>
+            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50298";>CVE-2023-50298</a></td>
+            <td>2024-02-08</td>
+            <td><a 
href="#cve-2023-50298-apache-solr-can-expose-zookeeper-credentials-via-streaming-expressions">Apache
 Solr can expose ZooKeeper credentials via Streaming Expressions</a></td>
+        </tr>
+        <tr>
+            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50386";>CVE-2023-50386</a></td>
+            <td>2024-02-08</td>
+            <td><a 
href="#cve-2023-50386-apache-solr-backuprestore-apis-allow-for-deployment-of-executables-in-malicious-configsets">Apache
 Solr: Backup/Restore APIs allow for deployment of executables in malicious 
ConfigSets</a></td>
+        </tr>
         <tr>
             <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50290";>CVE-2023-50290</a></td>
             <td>2024-01-12</td>
@@ -242,28 +262,119 @@ with you to see if we can provide this information in 
other variations or format
             <td>2019-11-18</td>
             <td><a 
href="#cve-2019-12409-apache-solr-rce-vulnerability-due-to-bad-config-default">Apache
 Solr RCE vulnerability due to bad config default</a></td>
         </tr>
-        <tr>
-            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2019-12401";>CVE-2019-12401</a></td>
-            <td>2019-09-09</td>
-            <td><a 
href="#cve-2019-12401-xml-bomb-in-apache-solr-versions-prior-to-50">XML Bomb in 
Apache Solr versions prior to 5.0</a></td>
-        </tr>
-        <tr>
-            <td></td>
-            <td>2019-08-14</td>
-            <td><a 
href="#announce-811-and-820-users-check-enable_remote_jmx_opts-setting">[ANNOUNCE]
 8.1.1 and 8.2.0 users check ENABLE_REMOTE_JMX_OPTS setting</a></td>
-        </tr>
-        <tr>
-            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2019-0193";>CVE-2019-0193</a></td>
-            <td>2019-07-31</td>
-            <td><a 
href="#cve-2019-0193-apache-solr-remote-code-execution-via-dataimporthandler">Apache
 Solr, Remote Code Execution via DataImportHandler</a></td>
-        </tr>
-        <tr>
-            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2019-0192";>CVE-2019-0192</a></td>
-            <td>2019-03-06</td>
-            <td><a 
href="#cve-2019-0192-deserialization-of-untrusted-data-via-jmxserviceurl-in-apache-solr">Deserialization
 of untrusted data via jmx.serviceUrl in Apache Solr</a></td>
-        </tr>
     </table>
 
+  <h2 
id="cve-2023-50291-apache-solr-can-leak-certain-passwords-due-to-system-property-redaction-logic-inconsistencies">2024-02-08,
 CVE-2023-50291: Apache Solr can leak certain passwords due to System Property 
redaction logic inconsistencies
+    <a class="headerlink" 
href="#cve-2023-50291-apache-solr-can-leak-certain-passwords-due-to-system-property-redaction-logic-inconsistencies"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity:</strong><br>
+Moderate</p>
+<p><strong>Versions Affected:</strong></p>
+<ul>
+<li>Apache Solr 6.0.0 through 8.11.2</li>
+<li>Apache Solr 9.0.0 before 9.3.0</li>
+</ul>
+<p><strong>Description:</strong><br>
+Insufficiently Protected Credentials vulnerability in Apache Solr.</p>
+<p>This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 9.0.0 
before 9.3.0.
+One of the two endpoints that publishes the Solr process' Java system 
properties, /admin/info/properties, was only setup to hide system properties 
that had "password" contained in the name.
+There are a number of sensitive system properties, such as "basicauth" and 
"aws.secretKey" do not contain "password", thus their values were published via 
the "/admin/info/properties" endpoint.
+This endpoint populates the list of System Properties on the home screen of 
the Solr Admin page, making the exposed credentials visible in the UI.</p>
+<p>This /admin/info/properties endpoint is protected under the "config-read" 
permission.
+Therefore, Solr Clouds with Authorization enabled will only be vulnerable 
through logged-in users that have the "config-read" permission.
+Users are recommended to upgrade to version 9.3.0 or 8.11.3, which fixes the 
issue.
+A single option now controls hiding Java system property for all endpoints, 
"-Dsolr.hiddenSysProps".
+By default all known sensitive properties are hidden (including 
"-Dbasicauth"), as well as any property with a name containing "secret" or 
"password".</p>
+<p>Users who cannot upgrade can also use the following Java system property to 
fix the issue:<br>
+<code>-Dsolr.redaction.system.pattern=".*(password|secret|basicauth).*"</code></p>
+<p><strong>Mitigation:</strong><br>
+Users are recommended to upgrade to version 8.11.3, 9.3.0 or later, which has 
consistent systemProperty redaction logic.</p>
+<p><strong>Credit:</strong>
+Michael Taggart (reporter)</p>
+<p><strong>References:</strong><br>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-16809";>SOLR-16809</a><br>
+CVE - <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50291";>CVE-2023-50291</a></p>
+  <hr/>
+  <h2 
id="cve-2023-50292-apache-solr-schema-designer-blindly-trusts-all-configsets-possibly-leading-to-rce-by-unauthenticated-users">2024-02-08,
 CVE-2023-50292: Apache Solr Schema Designer blindly "trusts" all configsets, 
possibly leading to RCE by unauthenticated users
+    <a class="headerlink" 
href="#cve-2023-50292-apache-solr-schema-designer-blindly-trusts-all-configsets-possibly-leading-to-rce-by-unauthenticated-users"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity:</strong><br>
+Moderate</p>
+<p><strong>Versions Affected:</strong></p>
+<ul>
+<li>Apache Solr 6.0.0 through 8.11.2</li>
+<li>Apache Solr 9.0.0 before 9.3.0</li>
+</ul>
+<p><strong>Description:</strong><br>
+Incorrect Permission Assignment for Critical Resource, Improper Control of 
Dynamically-Managed Code Resources vulnerability in Apache Solr.</p>
+<p>This issue affects Apache Solr: from 8.10.0 through 8.11.2, from 9.0.0 
before 9.3.0.</p>
+<p>The Schema Designer was introduced to allow users to more easily configure 
and test new Schemas and configSets.
+However, when the feature was created, the "trust" (authentication) of these 
configSets was not considered.
+External library loading is only available to configSets that are "trusted" 
(created by authenticated users), thus non-authenticated users are unable to 
perform Remote Code Execution.
+Since the Schema Designer loaded configSets without taking their "trust" into 
account, configSets that were created by unauthenticated users were allowed to 
load external libraries when used in the Schema Designer.</p>
+<p><strong>Mitigation:</strong><br>
+Users are recommended to upgrade to version 8.11.3, 9.3.0 or later.</p>
+<p><strong>Credit:</strong>
+Skay (reporter)</p>
+<p><strong>References:</strong><br>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-16777";>SOLR-16777</a><br>
+CVE - <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50292";>CVE-2023-50292</a></p>
+  <hr/>
+  <h2 
id="cve-2023-50298-apache-solr-can-expose-zookeeper-credentials-via-streaming-expressions">2024-02-08,
 CVE-2023-50298: Apache Solr can expose ZooKeeper credentials via Streaming 
Expressions
+    <a class="headerlink" 
href="#cve-2023-50298-apache-solr-can-expose-zookeeper-credentials-via-streaming-expressions"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity:</strong><br>
+Low</p>
+<p><strong>Versions Affected:</strong></p>
+<ul>
+<li>Apache Solr 6.0.0 through 8.11.2</li>
+<li>Apache Solr 9.0.0 before 9.4.1</li>
+</ul>
+<p><strong>Description:</strong><br>
+Exposure of Sensitive Information to an Unauthorized Actor vulnerability in 
Apache Solr.This issue affects Apache Solr: from 6.0.0 through 8.11.2, from 
9.0.0 before 9.4.1.</p>
+<p>Solr Streaming Expressions allows users to extract data from other Solr 
Clouds, using a "zkHost" parameter.
+When original SolrCloud is setup to use ZooKeeper credentials and ACLs, they 
will be sent to whatever "zkHost" the user provides.
+An attacker could setup a server to mock ZooKeeper, that accepts ZooKeeper 
requests with credentials and ACLs and extracts the sensitive information,
+then send a streaming expression using the mock server's address in "zkHost".
+Streaming Expressions are exposed via the "/streaming" handler, with "read" 
permissions.</p>
+<p><strong>Mitigation:</strong><br>
+Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the 
issue.
+From these versions on, only zkHost values that have the same server address 
(regardless of chroot), will use the given ZooKeeper credentials and ACLs when 
connecting.</p>
+<p><strong>Credit:</strong>
+Qing Xu (reporter)</p>
+<p><strong>References:</strong><br>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-17098";>SOLR-17098</a><br>
+CVE - <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50298";>CVE-2023-50298</a></p>
+  <hr/>
+  <h2 
id="cve-2023-50386-apache-solr-backuprestore-apis-allow-for-deployment-of-executables-in-malicious-configsets">2024-02-08,
 CVE-2023-50386: Apache Solr: Backup/Restore APIs allow for deployment of 
executables in malicious ConfigSets
+    <a class="headerlink" 
href="#cve-2023-50386-apache-solr-backuprestore-apis-allow-for-deployment-of-executables-in-malicious-configsets"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity:</strong><br>
+Moderate</p>
+<p><strong>Versions Affected:</strong></p>
+<ul>
+<li>Apache Solr 6.0.0 through 8.11.2</li>
+<li>Apache Solr 9.0.0 before 9.4.1</li>
+</ul>
+<p><strong>Description:</strong><br>
+Improper Control of Dynamically-Managed Code Resources, Unrestricted Upload of 
File with Dangerous Type, Inclusion of Functionality from Untrusted Control 
Sphere vulnerability in Apache Solr.This issue affects Apache Solr: from 6.0.0 
through 8.11.2, from 9.0.0 before 9.4.1.</p>
+<p>In the affected versions, Solr ConfigSets accepted Java jar and class files 
to be uploaded through the ConfigSets API.
+When backing up Solr Collections, these configSet files would be saved to disk 
when using the LocalFileSystemRepository (the default for backups).
+If the backup was saved to a directory that Solr uses in its 
ClassPath/ClassLoaders, then the jar and class files would be available to use 
with any ConfigSet, trusted or untrusted.</p>
+<p>When Solr is run in a secure way (Authorization enabled), as is strongly 
suggested, this vulnerability is limited to extending the Backup permissions 
with the ability to add libraries.</p>
+<p><strong>Mitigation:</strong><br>
+Users are recommended to upgrade to version 8.11.3 or 9.4.1, which fix the 
issue.
+In these versions, the following protections have been added:</p>
+<ul>
+<li>Users are no longer able to upload files to a configSet that could be 
executed via a Java ClassLoader.</li>
+<li>The Backup API restricts saving backups to directories that are used in 
the ClassLoader.</li>
+</ul>
+<p><strong>Credit:</strong>
+L3yx (reporter)</p>
+<p><strong>References:</strong><br>
+JIRA - <a 
href="https://issues.apache.org/jira/browse/SOLR-16949";>SOLR-16949</a><br>
+CVE - <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-50386";>CVE-2023-50386</a></p>
+  <hr/>
   <h2 
id="cve-2023-50290-apache-solr-allows-read-access-to-host-environment-variables">2024-01-12,
 CVE-2023-50290: Apache Solr allows read access to host environment variables
     <a class="headerlink" 
href="#cve-2023-50290-apache-solr-allows-read-access-to-host-environment-variables"
 title="Permanent link">¶</a>
   </h2>
@@ -551,131 +662,6 @@ Solr JIRA user 'jnyryan' (John)</p>
 <p><strong>References:</strong><br>
 [1] https://issues.apache.org/jira/browse/SOLR-13647<br>
 [3] https://solr.apache.org/news.html</p>
-  <hr/>
-  <h2 
id="cve-2019-12401-xml-bomb-in-apache-solr-versions-prior-to-50">2019-09-09, 
CVE-2019-12401: XML Bomb in Apache Solr versions prior to 5.0
-    <a class="headerlink" 
href="#cve-2019-12401-xml-bomb-in-apache-solr-versions-prior-to-50" 
title="Permanent link">¶</a>
-  </h2>
-  <p><strong>Severity:</strong> Medium</p>
-<p><strong>Vendor:</strong><br>
-The Apache Software Foundation</p>
-<p><strong>Versions Affected:</strong></p>
-<ul>
-<li>1.3.0 to 1.4.1</li>
-<li>3.1.0 to 3.6.2</li>
-<li>4.0.0 to 4.10.4</li>
-</ul>
-<p><strong>Description:</strong><br>
-Solr versions prior to 5.0.0 are vulnerable to an XML resource
-consumption attack (a.k.a. Lol Bomb) via it’s update handler. By leveraging
-XML DOCTYPE and ENTITY type elements, the attacker can create a pattern
-that will expand when the server parses the XML causing OOMs</p>
-<p><strong>Mitigation:</strong>  </p>
-<ul>
-<li>Upgrade to Apache Solr 5.0 or later.</li>
-<li>Ensure your network settings are configured so that only trusted traffic 
is allowed to post documents to the running Solr instances.</li>
-</ul>
-<p><strong>Credit:</strong><br>
-Matei "Mal" Badanoiu</p>
-<p><strong>References:</strong></p>
-<ul>
-<li><a 
href="https://issues.apache.org/jira/browse/SOLR-13750";>https://issues.apache.org/jira/browse/SOLR-13750</a></li>
-<li><a 
href="https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity";>https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity</a></li>
-</ul>
-  <hr/>
-  <h2 
id="announce-811-and-820-users-check-enable_remote_jmx_opts-setting">2019-08-14,
 [ANNOUNCE] 8.1.1 and 8.2.0 users check ENABLE_REMOTE_JMX_OPTS setting
-    <a class="headerlink" 
href="#announce-811-and-820-users-check-enable_remote_jmx_opts-setting" 
title="Permanent link">¶</a>
-  </h2>
-  <div class="codehilite"><pre><span></span><code><span 
class="n">Severity</span><span class="o">:</span> <span class="n">Low</span>
-
-<span class="n">Versions</span> <span class="n">Affected</span><span 
class="o">:</span>
-<span class="mf">8.1</span><span class="o">.</span><span class="mi">1</span> 
<span class="n">and</span> <span class="mf">8.2</span><span 
class="o">.</span><span class="mi">0</span> <span class="k">for</span> <span 
class="n">Linux</span>
-
-<span class="n">Description</span><span class="o">:</span>
-<span class="n">It</span> <span class="n">has</span> <span 
class="n">been</span> <span class="n">discovered</span> <span 
class="o">[</span><span class="mi">1</span><span class="o">]</span> <span 
class="n">that</span> <span class="n">the</span> <span 
class="mf">8.1</span><span class="o">.</span><span class="mi">1</span> <span 
class="n">and</span> <span class="mf">8.2</span><span class="o">.</span><span 
class="mi">0</span> <span class="n">releases</span> <span 
class="n">contain</span> <spa [...]
-<span class="n">setting</span> <span class="k">for</span> <span 
class="n">the</span> <span class="n">ENABLE_REMOTE_JMX_OPTS</span> <span 
class="n">setting</span> <span class="k">in</span> <span class="n">the</span> 
<span class="k">default</span> <span class="n">solr</span><span 
class="o">.</span><span class="na">in</span><span class="o">.</span><span 
class="na">sh</span> <span class="n">file</span>
-<span class="n">shipping</span> <span class="k">with</span> <span 
class="n">Solr</span><span class="o">.</span>
-
-<span class="n">Windows</span> <span class="n">users</span> <span 
class="n">and</span> <span class="n">users</span> <span class="k">with</span> 
<span class="n">custom</span> <span class="n">solr</span><span 
class="o">.</span><span class="na">in</span><span class="o">.</span><span 
class="na">sh</span> <span class="n">files</span> <span class="n">are</span> 
<span class="n">not</span> <span class="n">affected</span><span 
class="o">.</span>
-
-<span class="n">If</span> <span class="n">you</span> <span 
class="n">are</span> <span class="n">using</span> <span class="n">the</span> 
<span class="k">default</span> <span class="n">solr</span><span 
class="o">.</span><span class="na">in</span><span class="o">.</span><span 
class="na">sh</span> <span class="n">file</span> <span class="n">from</span> 
<span class="n">the</span> <span class="n">affected</span> <span 
class="n">releases</span><span class="o">,</span> <span class="n">then</span>
-<span class="n">JMX</span> <span class="n">monitoring</span> <span 
class="n">will</span> <span class="n">be</span> <span class="n">enabled</span> 
<span class="n">and</span> <span class="n">exposed</span> <span 
class="n">on</span> <span class="n">JMX_PORT</span> <span 
class="o">(</span><span class="k">default</span> <span class="o">=</span> <span 
class="mi">18983</span><span class="o">),</span>
-<span class="n">without</span> <span class="n">any</span> <span 
class="n">authentication</span><span class="o">.</span> <span 
class="n">So</span> <span class="k">if</span> <span class="n">your</span> <span 
class="n">firewalls</span> <span class="n">allows</span> <span 
class="n">inbound</span> <span class="n">traffic</span> <span 
class="n">on</span>
-<span class="n">JMX_PORT</span><span class="o">,</span> <span 
class="n">then</span> <span class="n">anyone</span> <span class="k">with</span> 
<span class="n">network</span> <span class="n">access</span> <span 
class="n">to</span> <span class="n">your</span> <span class="n">Solr</span> 
<span class="n">nodes</span> <span class="n">will</span> <span 
class="n">be</span> <span class="n">able</span> <span class="n">to</span>
-<span class="n">access</span> <span class="n">monitoring</span> <span 
class="n">data</span> <span class="n">exposed</span> <span 
class="n">over</span> <span class="n">JMX</span><span class="o">.</span>
-
-<span class="n">Mitigation</span><span class="o">:</span>
-<span class="n">Edit</span> <span class="n">solr</span><span 
class="o">.</span><span class="na">in</span><span class="o">.</span><span 
class="na">sh</span><span class="o">,</span> <span class="kd">set</span> <span 
class="n">ENABLE_REMOTE_JMX_OPTS</span><span class="o">=</span><span 
class="kc">false</span> <span class="n">and</span> <span 
class="n">restart</span> <span class="n">Solr</span><span class="o">.</span>
-<span class="n">Alternatively</span> <span class="n">wait</span> <span 
class="k">for</span> <span class="n">the</span> <span class="n">future</span> 
<span class="mf">8.3</span><span class="o">.</span><span class="mi">0</span> 
<span class="n">release</span> <span class="n">and</span> <span 
class="n">upgrade</span><span class="o">.</span>
-
-<span class="n">References</span><span class="o">:</span>
-<span class="o">[</span><span class="mi">1</span><span class="o">]</span> 
<span class="n">https</span><span class="o">://</span><span 
class="n">issues</span><span class="o">.</span><span 
class="na">apache</span><span class="o">.</span><span 
class="na">org</span><span class="sr">/jira/browse/</span><span 
class="n">SOLR</span><span class="o">-</span><span class="mi">13647</span>
-</code></pre></div>
-  <hr/>
-  <h2 
id="cve-2019-0193-apache-solr-remote-code-execution-via-dataimporthandler">2019-07-31,
 CVE-2019-0193: Apache Solr, Remote Code Execution via DataImportHandler
-    <a class="headerlink" 
href="#cve-2019-0193-apache-solr-remote-code-execution-via-dataimporthandler" 
title="Permanent link">¶</a>
-  </h2>
-  <p><strong>Severity:</strong> High</p>
-<p><strong>Vendor:</strong><br>
-The Apache Software Foundation</p>
-<p><strong>Versions Affected:</strong></p>
-<ul>
-<li>5.0.0 to 5.5.5</li>
-<li>6.0.0 to 6.6.5</li>
-</ul>
-<p><strong>Description:</strong><br>
-The DataImportHandler, an optional but popular module to pull in data from
-databases and other sources, has a feature in which the whole DIH
-configuration can come from a request's "dataConfig" parameter. The debug
-mode of the DIH admin screen uses this to allow convenient debugging /
-development of a DIH config. Since a DIH config can contain scripts, this
-parameter is a security risk. Starting with version 8.2.0 of Solr, use of
-this parameter requires setting the Java System property
-<code>enable.dih.dataConfigParam</code> to true.</p>
-<p><strong>Mitigation:</strong>  </p>
-<ul>
-<li>Upgrade to 8.2.0 or later, which is secure by default.</li>
-<li>or, edit solrconfig.xml to configure all DataImportHandler usages with an 
"invariants" section listing the "dataConfig" parameter set to am empty 
string.</li>
-<li>Ensure your network settings are configured so that only trusted traffic 
communicates with Solr, especially to the DIH request handler.  This is a best 
practice to all of Solr.</li>
-</ul>
-<p><strong>Credit:</strong><br>
-Michael Stepankin (JPMorgan Chase)</p>
-<p><strong>References:</strong></p>
-<ul>
-<li><a 
href="https://issues.apache.org/jira/browse/SOLR-13669";>https://issues.apache.org/jira/browse/SOLR-13669</a></li>
-<li><a 
href="https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity";>https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity</a></li>
-</ul>
-  <hr/>
-  <h2 
id="cve-2019-0192-deserialization-of-untrusted-data-via-jmxserviceurl-in-apache-solr">2019-03-06,
 CVE-2019-0192: Deserialization of untrusted data via jmx.serviceUrl in Apache 
Solr
-    <a class="headerlink" 
href="#cve-2019-0192-deserialization-of-untrusted-data-via-jmxserviceurl-in-apache-solr"
 title="Permanent link">¶</a>
-  </h2>
-  <p><strong>Severity:</strong> High</p>
-<p><strong>Vendor:</strong><br>
-The Apache Software Foundation</p>
-<p><strong>Versions Affected:</strong></p>
-<ul>
-<li>5.0.0 to 5.5.5</li>
-<li>6.0.0 to 6.6.5</li>
-</ul>
-<p><strong>Description:</strong><br>
-ConfigAPI allows to configure Solr's JMX server via an HTTP POST request.
-By pointing it to a malicious RMI server, an attacker could take advantage
-of Solr's unsafe deserialization to trigger remote code execution on the
-Solr side.</p>
-<p><strong>Mitigation:</strong><br>
-Any of the following are enough to prevent this vulnerability:</p>
-<ul>
-<li>Upgrade to Apache Solr 7.0 or later.</li>
-<li>Disable the ConfigAPI if not in use, by running Solr with the system 
property “disable.configEdit=true”</li>
-<li>If upgrading or disabling the Config API are not viable options, apply 
patch in [1] and re-compile Solr.</li>
-<li>Ensure your network settings are configured so that only trusted traffic 
is allowed to ingress/egress your hosts running Solr.</li>
-</ul>
-<p><strong>Credit:</strong><br>
-Michael Stepankin</p>
-<p><strong>References:</strong></p>
-<ul>
-<li><a 
href="https://issues.apache.org/jira/browse/SOLR-13301";>https://issues.apache.org/jira/browse/SOLR-13301</a></li>
-<li><a 
href="https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity";>https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity</a></li>
-</ul>
   <hr/>
   <h1 id="cve-reports-for-apache-solr-dependencies">CVE reports for Apache 
Solr dependencies</h1>
   <p>Below is a list of CVE vulnerabilities in Apache Solr dependencies, and 
the state of their applicability to Solr.</p>

Reply via email to