<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-45083 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-45083/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 15:35:36 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-45083/feed.xml" rel="self" type="application/rss+xml"/><item><title>Goobi Viewer Unauthenticated Solr Streaming Expression Proxy Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-goobi-viewer-solr-proxy/</link><pubDate>Wed, 13 May 2026 15:35:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-goobi-viewer-solr-proxy/</guid><description>The Goobi viewer REST endpoint accepted an arbitrary Solr streaming expression from unauthenticated network clients, enabling attackers to read, modify, or delete the complete Solr index; this was resolved by removing the affected API endpoint.</description><content:encoded><![CDATA[<p>The Goobi viewer is vulnerable to an unauthenticated Solr streaming expression proxy issue. Specifically, the REST endpoint <code>POST /api/v1/index/stream</code> was accepting arbitrary Solr streaming expressions from unauthenticated network clients and forwarding them to the backend Solr server without any restrictions. This vulnerability, present in versions 4.8.0 up to and including 26.04, allowed attackers to potentially read the entire Solr index and modify or delete indexed records. The vulnerability has been addressed by removing the affected API endpoint in commit 326980f24c. This vulnerability matters because it could lead to complete data loss or unauthorized disclosure of sensitive data. The CVE assigned to this vulnerability is CVE-2026-45083.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a POST request to <code>/api/v1/index/stream</code> on the Goobi viewer server.</li>
<li>The attacker crafts a malicious Solr streaming expression within the body of the POST request.</li>
<li>The Goobi viewer forwards the attacker-supplied Solr streaming expression to the backend Solr server.</li>
<li>The Solr server executes the streaming expression without proper authorization checks due to the exposed proxy endpoint.</li>
<li>Using <code>select()</code> the attacker reads the content of the Solr index, including documents protected by access conditions.</li>
<li>The attacker uses <code>update()</code> streaming expressions to overwrite indexed field values, potentially changing metadata or access conditions.</li>
<li>Alternatively, the attacker uses <code>delete()</code> streaming expressions to remove documents from the index.</li>
<li>If delete is used, the attacker can wipe the entire collection, leading to a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability could result in the complete disclosure of all documents indexed by the Goobi viewer, including those protected by access conditions. Attackers could also modify metadata, change access conditions, or corrupt the document structure. A single <code>delete()</code> expression can permanently remove documents, potentially leading to complete data loss and requiring a full re-index of the Solr collection. This vulnerability impacts organizations that rely on Goobi viewer to manage and serve sensitive documents.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch provided in commit <a href="https://github.com/advisories/GHSA-2rgp-f66f-4499">326980f24c</a> to remove the vulnerable endpoint.</li>
<li>As an immediate workaround, block access to the <code>/api/v1/index/stream</code> endpoint using a reverse proxy or Tomcat configuration as detailed in the advisory to prevent exploitation.</li>
<li>Deploy the Sigma rule &ldquo;Detect Goobi Viewer Solr Streaming Expression Attempt&rdquo; to identify potential exploitation attempts targeting the vulnerable endpoint.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>solr</category><category>proxy</category><category>unauthenticated</category><category>CVE-2026-45083</category><category>critical</category></item></channel></rss>