You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@lucene.apache.org by "Joel Bernstein (JIRA)" <ji...@apache.org> on 2015/11/09 20:01:10 UTC

[jira] [Updated] (SOLR-8262) Comment out /stream handler from sample solrconfig.xml's for security reasons

     [ https://issues.apache.org/jira/browse/SOLR-8262?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Joel Bernstein updated SOLR-8262:
---------------------------------
    Description: 
Solr has apache commons-collections in it's classpath. 

*This makes it vulnerable to this security issue https://issues.apache.org/jira/browse/COLLECTIONS-580. 
*The /stream handler uses Java serialization for RPC since Solr 5.1. 

These two combined leave a security hole in Solr that allows arbitrary code to be executed on the server.

This ticket will comment out the /stream handler from the sample solrconfig.xml's and add a warning to explain the vulnerability.

  was:
The /stream handler uses Java serialization for RPC. This presents a security risk because it allows anyone with access to the Solr ip/port to send arbitrary serialized objects to Solr.

This should not be on by default.

This ticket will comment out the /stream handler from the sample solrconfig.xml's and add a warning stating that this feature relies on Java serialization for RPC.


> Comment out /stream handler from sample solrconfig.xml's for security reasons
> -----------------------------------------------------------------------------
>
>                 Key: SOLR-8262
>                 URL: https://issues.apache.org/jira/browse/SOLR-8262
>             Project: Solr
>          Issue Type: Bug
>            Reporter: Joel Bernstein
>
> Solr has apache commons-collections in it's classpath. 
> *This makes it vulnerable to this security issue https://issues.apache.org/jira/browse/COLLECTIONS-580. 
> *The /stream handler uses Java serialization for RPC since Solr 5.1. 
> These two combined leave a security hole in Solr that allows arbitrary code to be executed on the server.
> This ticket will comment out the /stream handler from the sample solrconfig.xml's and add a warning to explain the vulnerability.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)

---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@lucene.apache.org
For additional commands, e-mail: dev-help@lucene.apache.org