Skip to content

Access Control: Apache Solr 7+ - Remote Code Execution (Apache Log4j)

Identifier: apache_solr_log4j_rce

Scanner(s) Support

GraphQL Scanner REST Scanner WebApp Scanner ASM Scanner

Description

Apache Solr 7+ is affected by Log4j remote code execution vulnerabilities where JNDI features do not protect against attacker-controlled LDAP and other JNDI endpoints, allowing remote code execution.

How we test: We test for Log4j remote code execution vulnerabilities in Apache Solr by injecting JNDI lookup payloads into log messages and parameters, then analyzing responses to detect if remote code execution is possible.

Reference:

Configuration

Example

Example configuration:

---
security_tests:
  apache_solr_log4j_rce:
    skip: false

Reference

skip

Type : boolean

Skip the test if true.