[SOLR-17822] Document non-exploitability of CVE-2025-48924#152
[SOLR-17822] Document non-exploitability of CVE-2025-48924#152ppkarwasz wants to merge 1 commit intoapache:mainfrom
Conversation
This update documents that CVE-2025-48924 is **not exploitable** in Apache Solr, based on detailed dependency analysis and code path evaluation. ### Summary Although Solr includes the vulnerable **Commons Lang** library and transitive dependencies such as **Commons Text** and **Commons Configuration**, the conditions required for exploitation are **not met** in any Solr execution paths. ### Detailed Analysis * The vulnerable Commons Lang functionality is only exercised via **Commons Text**. * According to the [Apache Commons Text VEX document](https://raw.githubusercontent.com/apache/commons-text/refs/heads/master/src/conf/security/VEX.cyclonedx.xml), exploitation is limited to the use of **`StringSubstitutor`** and **`StringLookup`**. * These classes are **not used directly** in Solr’s codebase. * Commons Text is only included in two Solr modules: * `solr-sql` * `solr-hadoop-auth` * Neither module makes any direct or indirect use of the vulnerable classes. * The only dependency that uses these classes is **Commons Configuration**, which is pulled in transitively via **Hadoop**. * Specifically, it is used by the `MetricsConfig` class in the `hadoop-common` library. * This code path parses only the `hadoop-metrics2.properties` file, which is considered a **trusted configuration file**, typically provided by the system administrator. As a result, the vulnerable expression interpolation logic is **never invoked with untrusted input**, and Solr **does not meet the conditions for exploitability** outlined in the [Apache Commons Configuration VEX document](https://raw.githubusercontent.com/apache/commons-configuration/refs/heads/master/src/conf/security/VEX.cyclonedx.xml). ### References * [Apache Commons Text VEX document](https://raw.githubusercontent.com/apache/commons-text/refs/heads/master/src/conf/security/VEX.cyclonedx.xml) * [Apache Commons Configuration VEX document](https://raw.githubusercontent.com/apache/commons-configuration/refs/heads/master/src/conf/security/VEX.cyclonedx.xml)
|
Could you please add a test for the change? In other words, you suggest adding a VEX file that says "solr is currently not affected by not_affected". Correct me if I am wrong, but adding such a VEX would require manual review on every release (==one would have to review the full code including the transitive dependencies and reflection to prove |
|
The current VEX statement is explicitly scoped to the version range This assessment was performed manually and verified against version For future releases, the dependency has already been upgraded to |
This update documents that CVE-2025-48924 is not exploitable in Apache Solr, based on detailed dependency analysis and code path evaluation.
Summary
Although Solr includes the vulnerable Commons Lang library and transitive dependencies such as Commons Text and Commons Configuration, the conditions required for exploitation are not met in any Solr execution paths.
Detailed Analysis
The vulnerable Commons Lang functionality is only exercised via Commons Text.
According to the Apache Commons Text VEX document, exploitation is limited to the use of
StringSubstitutorandStringLookup.These classes are not used directly in Solr’s codebase.
Commons Text is only included in two Solr modules:
solr-sqlsolr-hadoop-authNeither module makes any indirect use of the vulnerable classes, with one exception.
The only dependency that uses these classes is Commons Configuration, which is pulled in transitively via Hadoop.
MetricsConfigclass in thehadoop-commonlibrary.hadoop-metrics2.propertiesfile, which is considered a trusted configuration file, typically provided by the system administrator.As a result, the vulnerable expression interpolation logic is never invoked with untrusted input, and Solr does not meet the conditions for exploitability outlined in the Apache Commons Configuration VEX document.
References