Lucene search

K
redhatcveRedhat.comRH:CVE-2024-31391
HistoryApr 25, 2024 - 11:10 p.m.

CVE-2024-31391

2024-04-2523:10:36
redhat.com
access.redhat.com
5
sensitive information
log file
apache solr operator
vulnerability
probes
credentials
authentication
upgrade
mitigation
solr operator

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

8.3%

A vulnerability was found in Apache Solr Operator. When bootstraping Solr security, a couple of initial user accounts are created by default, including a β€œk8s-oper” account. This account is used by the operator to send requests to Solr, such as health checks. When one of the probes used by these requests fails and authentication is being used, the Solr Operator ends, creating a Kubernetes event containing the username and password of the β€œk8s-oper” account.

Mitigation

This issue can be mitigated by disabling authentication on the health check probes by setting the following configuration option:

.solrOptions.security.probesRequireAuth=false

6.8 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

8.3%

Related for RH:CVE-2024-31391