Core creation allows users to replace "trusted" configset files with arbitrary configurationSolr instances that (1) use the "FileSystemConfigSetService" component (the default in "standalone" or "user-managed" mode), and (2) are running without authentication and authorization are vulnerable to a sort of privilege escalation wherein individual "trusted" configset files can be ignored in favor of potentially-untrusted replacements available elsewhere on the filesystem. These replacement config files are treated as "trusted" and can use "
No PoCs from references.
- https://github.com/DependencyTrack/vuln-db
- https://github.com/metabrainz/musicbrainz-docker