Security Experts:

Connect with us

Hi, what are you looking for?



Several Vulnerabilities Found in Enterprise Search Engine SearchBlox

Various types of vulnerabilities have been identified in SearchBlox, the enterprise search solution built on top of Apache Lucene/Solr and Elasticsearch.

Various types of vulnerabilities have been identified in SearchBlox, the enterprise search solution built on top of Apache Lucene/Solr and Elasticsearch.

According to an advisory posted by the CERT Coordination Center at Carnegie Mellon University, a total of four types of security issues have been uncovered by Qualys researcher Ashish Kamble. The flaws are said to affect SearchBlox 8.1.x and earlier versions.

The expert has found both reflected and persistent cross-site scripting (XSS) vulnerabilities in SearchBlox (CVE-2015-0967). A persistent XSS bug has been identified in the “title” field of the “Create Featured Result” form, but this flaw can only be exploited by an authenticated attacker.

An unrestricted file upload vulnerability (CVE-2015-0968) also plagues SearchBlox. An attacker can exploit this flaw to upload active content, such as JSP pages, to a vulnerable server. Files can be uploaded using the image upload form hosted at /searchblox/admin/uploadImage.html by changing the file’s “Content-Type” to “image/jpeg.” Once the malicious file is uploaded, the attacker can execute it.

The vulnerable page can be accessed even by an unauthenticated attacker, CERT/CC noted. This issue was previously reported back in 2013, but it appears that it wasn’t fixed properly at the time.

Another vulnerability found in SearchBlox is related to the following URL:


An unauthenticated attacker can access this URL and gain access to potentially sensitive information. This information exposure flaw has been assigned the CVE identifier CVE-2015-0969.

Finally, older versions of SearchBlox are affected by a cross-site request forgery (CSRF) weakness that allows an attacker to execute various actions with the victim’s privileges. However, targeted users must have an active session and the attacker must be able to trick them into clicking on a specially crafted link.

“A remote, unauthenticated attacker may be able to execute arbitrary script in the contexts of the end-user’s browser session, the application, or an authenticated user. Sensitive information may be exposed to unauthenticated users,” CERT/CC said regarding the impact of these vulnerabilities.

SearchBlox was informed of the existence of these security holes in late February. The vulnerabilities have been addressed with the release of SearchBlox 8.2, according to CERT/CC. Users are advised to update their installations as soon as possible.

SearchBlox is used by more than 300 organizations across 30 countries. The solution can be used to search information in websites, e-commerce product catalogs, intranet applications, the cloud, and Salesforce.

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Expert Insights

Related Content

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Email Security

Microsoft is urging customers to install the latest Exchange Server updates and harden their environments to prevent malicious attacks.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.


Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.


Google has awarded more than $25,000 to the researchers who reported the vulnerabilities patched with the release of the latest Chrome update.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.