You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@lucene.apache.org by Uwe Schindler <us...@apache.org> on 2014/08/19 01:33:55 UTC

[ANNOUNCE] [SECURITY] Recommendation to update Apache POI in Apache Solr 4.8.0, 4.8.1, and 4.9.0 installations

Hallo Apache Solr Users,

the Apache Lucene PMC wants to make the users of Solr aware of  the following issue:

Apache Solr versions 4.8.0, 4.8.1, 4.9.0 bundle Apache POI 3.10-beta2 with its binary release tarball. This version (and all previous ones) of Apache POI are vulnerable to the following issues:

= CVE-2014-3529: XML External Entity (XXE) problem in Apache POI's OpenXML parser =
Type: Information disclosure
Description: Apache POI uses Java's XML components to parse OpenXML files produced by Microsoft Office products (DOCX, XLSX, PPTX,...). Applications that accept such files from end-users are vulnerable to XML External Entity (XXE) attacks, which allows remote attackers to bypass security restrictions and read arbitrary files via a crafted OpenXML document that provides an XML external entity declaration in conjunction with an entity reference.

= CVE-2014-3574: XML Entity Expansion (XEE) problem in Apache POI's OpenXML parser =
Type: Denial of service
Description: Apache POI uses Java's XML components and Apache Xmlbeans to parse OpenXML files produced by Microsoft Office products (DOCX, XLSX, PPTX,...). Applications that accept such files from end-users are vulnerable to XML Entity Expansion (XEE) attacks ("XML bombs"), which allows remote hackers to consume large amounts of CPU resources.

The Apache POI PMC released a bugfix version (3.10.1) today.

Solr users are affected by these issues, if they enable the "Apache Solr Content Extraction Library (Solr Cell)" contrib module from the folder "contrib/extraction" of the release tarball.

Users of Apache Solr are strongly advised to keep the module disabled if they don't use it. Alternatively, users of Apache Solr 4.8.0, 4.8.1, or 4.9.0 can update the affected libraries by replacing the vulnerable JAR files in the distribution folder. Users of previous versions have to update their Solr release first, patching older versions is impossible.

To replace the vulnerable JAR files follow these steps:

- Download the Apache POI 3.10.1 binary release: http://poi.apache.org/download.html#POI-3.10.1
- Unzip the archive
- Delete the following files in your "solr-4.X.X/contrib/extraction/lib" folder: 
	# poi-3.10-beta2.jar
	# poi-ooxml-3.10-beta2.jar
	# poi-ooxml-schemas-3.10-beta2.jar
	# poi-scratchpad-3.10-beta2.jar
	# xmlbeans-2.3.0.jar
- Copy the following files from the base folder of the Apache POI distribution to the "solr-4.X.X/contrib/extraction/lib" folder: 
	# poi-3.10.1-20140818.jar
	# poi-ooxml-3.10.1-20140818.jar
	# poi-ooxml-schemas-3.10.1-20140818.jar
	# poi-scratchpad-3.10.1-20140818.jar
- Copy "xmlbeans-2.6.0.jar" from POI's "ooxml-lib/" folder to the "solr-4.X.X/contrib/extraction/lib" folder.
- Verify that the "solr-4.X.X/contrib/extraction/lib" no longer contains any files with version number "3.10-beta2".
- Verify that the folder contains one xmlbeans JAR file with version 2.6.0.

If you just want to disable extraction of Microsoft Office documents, delete the files above and don't replace them. "Solr Cell" will automatically detect this and disable Microsoft Office document extraction.

Coming versions of Apache Solr will have the updated libraries bundled.

Happy Searching and Extracting,
The Apache Lucene Developers

PS: Thanks to Stefan Kopf, Mike Boufford, and Christian Schneider for reporting these issues!

-----
Uwe Schindler
uschindler@apache.org 
Apache Lucene PMC Member / Committer
Bremen, Germany
http://lucene.apache.org/




---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@lucene.apache.org
For additional commands, e-mail: dev-help@lucene.apache.org


RE: [ANNOUNCE] [SECURITY] Recommendation to update Apache POI in Apache Solr 4.8.0, 4.8.1, and 4.9.0 installations

Posted by Uwe Schindler <uw...@thetaphi.de>.
Hi,

It is already there:
http://repo1.maven.org/maven2/org/apache/poi/poi/3.10.1/

(and other artifacts in parallel folders)

Uwe

-----
Uwe Schindler
H.-H.-Meier-Allee 63, D-28213 Bremen
http://www.thetaphi.de
eMail: uwe@thetaphi.de


> -----Original Message-----
> From: Wright, Karl [mailto:karl.wright@here.com]
> Sent: Tuesday, August 19, 2014 2:10 AM
> To: dev@lucene.apache.org
> Subject: RE: [ANNOUNCE] [SECURITY] Recommendation to update Apache
> POI in Apache Solr 4.8.0, 4.8.1, and 4.9.0 installations
> 
> Did the POI folks give any indication about when they expected the 3.10.1
> artifacts to appear in Maven?
> 
> Karl
> 
> -----Original Message-----
> From: ext Uwe Schindler [mailto:uschindler@apache.org]
> Sent: Monday, August 18, 2014 7:34 PM
> To: announce@apache.org
> Cc: solr-user@lucene.apache.org; dev@lucene.apache.org;
> general@lucene.apache.org
> Subject: [ANNOUNCE] [SECURITY] Recommendation to update Apache POI
> in Apache Solr 4.8.0, 4.8.1, and 4.9.0 installations
> 
> Hallo Apache Solr Users,
> 
> the Apache Lucene PMC wants to make the users of Solr aware of  the
> following issue:
> 
> Apache Solr versions 4.8.0, 4.8.1, 4.9.0 bundle Apache POI 3.10-beta2 with its
> binary release tarball. This version (and all previous ones) of Apache POI are
> vulnerable to the following issues:
> 
> = CVE-2014-3529: XML External Entity (XXE) problem in Apache POI's
> OpenXML parser =
> Type: Information disclosure
> Description: Apache POI uses Java's XML components to parse OpenXML
> files produced by Microsoft Office products (DOCX, XLSX, PPTX,...).
> Applications that accept such files from end-users are vulnerable to XML
> External Entity (XXE) attacks, which allows remote attackers to bypass
> security restrictions and read arbitrary files via a crafted OpenXML document
> that provides an XML external entity declaration in conjunction with an entity
> reference.
> 
> = CVE-2014-3574: XML Entity Expansion (XEE) problem in Apache POI's
> OpenXML parser =
> Type: Denial of service
> Description: Apache POI uses Java's XML components and Apache Xmlbeans
> to parse OpenXML files produced by Microsoft Office products (DOCX, XLSX,
> PPTX,...). Applications that accept such files from end-users are vulnerable to
> XML Entity Expansion (XEE) attacks ("XML bombs"), which allows remote
> hackers to consume large amounts of CPU resources.
> 
> The Apache POI PMC released a bugfix version (3.10.1) today.
> 
> Solr users are affected by these issues, if they enable the "Apache Solr
> Content Extraction Library (Solr Cell)" contrib module from the folder
> "contrib/extraction" of the release tarball.
> 
> Users of Apache Solr are strongly advised to keep the module disabled if
> they don't use it. Alternatively, users of Apache Solr 4.8.0, 4.8.1, or 4.9.0 can
> update the affected libraries by replacing the vulnerable JAR files in the
> distribution folder. Users of previous versions have to update their Solr
> release first, patching older versions is impossible.
> 
> To replace the vulnerable JAR files follow these steps:
> 
> - Download the Apache POI 3.10.1 binary release:
> http://poi.apache.org/download.html#POI-3.10.1
> - Unzip the archive
> - Delete the following files in your "solr-4.X.X/contrib/extraction/lib" folder:
> 	# poi-3.10-beta2.jar
> 	# poi-ooxml-3.10-beta2.jar
> 	# poi-ooxml-schemas-3.10-beta2.jar
> 	# poi-scratchpad-3.10-beta2.jar
> 	# xmlbeans-2.3.0.jar
> - Copy the following files from the base folder of the Apache POI distribution
> to the "solr-4.X.X/contrib/extraction/lib" folder:
> 	# poi-3.10.1-20140818.jar
> 	# poi-ooxml-3.10.1-20140818.jar
> 	# poi-ooxml-schemas-3.10.1-20140818.jar
> 	# poi-scratchpad-3.10.1-20140818.jar
> - Copy "xmlbeans-2.6.0.jar" from POI's "ooxml-lib/" folder to the "solr-
> 4.X.X/contrib/extraction/lib" folder.
> - Verify that the "solr-4.X.X/contrib/extraction/lib" no longer contains any
> files with version number "3.10-beta2".
> - Verify that the folder contains one xmlbeans JAR file with version 2.6.0.
> 
> If you just want to disable extraction of Microsoft Office documents, delete
> the files above and don't replace them. "Solr Cell" will automatically detect
> this and disable Microsoft Office document extraction.
> 
> Coming versions of Apache Solr will have the updated libraries bundled.
> 
> Happy Searching and Extracting,
> The Apache Lucene Developers
> 
> PS: Thanks to Stefan Kopf, Mike Boufford, and Christian Schneider for
> reporting these issues!
> 
> -----
> Uwe Schindler
> uschindler@apache.org
> Apache Lucene PMC Member / Committer
> Bremen, Germany
> http://lucene.apache.org/
> 
> 
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscribe@lucene.apache.org
> For additional commands, e-mail: dev-help@lucene.apache.org
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: dev-unsubscribe@lucene.apache.org
> For additional commands, e-mail: dev-help@lucene.apache.org



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@lucene.apache.org
For additional commands, e-mail: dev-help@lucene.apache.org


RE: [ANNOUNCE] [SECURITY] Recommendation to update Apache POI in Apache Solr 4.8.0, 4.8.1, and 4.9.0 installations

Posted by "Wright, Karl" <ka...@here.com>.
Did the POI folks give any indication about when they expected the 3.10.1 artifacts to appear in Maven?

Karl

-----Original Message-----
From: ext Uwe Schindler [mailto:uschindler@apache.org] 
Sent: Monday, August 18, 2014 7:34 PM
To: announce@apache.org
Cc: solr-user@lucene.apache.org; dev@lucene.apache.org; general@lucene.apache.org
Subject: [ANNOUNCE] [SECURITY] Recommendation to update Apache POI in Apache Solr 4.8.0, 4.8.1, and 4.9.0 installations

Hallo Apache Solr Users,

the Apache Lucene PMC wants to make the users of Solr aware of  the following issue:

Apache Solr versions 4.8.0, 4.8.1, 4.9.0 bundle Apache POI 3.10-beta2 with its binary release tarball. This version (and all previous ones) of Apache POI are vulnerable to the following issues:

= CVE-2014-3529: XML External Entity (XXE) problem in Apache POI's OpenXML parser =
Type: Information disclosure
Description: Apache POI uses Java's XML components to parse OpenXML files produced by Microsoft Office products (DOCX, XLSX, PPTX,...). Applications that accept such files from end-users are vulnerable to XML External Entity (XXE) attacks, which allows remote attackers to bypass security restrictions and read arbitrary files via a crafted OpenXML document that provides an XML external entity declaration in conjunction with an entity reference.

= CVE-2014-3574: XML Entity Expansion (XEE) problem in Apache POI's OpenXML parser =
Type: Denial of service
Description: Apache POI uses Java's XML components and Apache Xmlbeans to parse OpenXML files produced by Microsoft Office products (DOCX, XLSX, PPTX,...). Applications that accept such files from end-users are vulnerable to XML Entity Expansion (XEE) attacks ("XML bombs"), which allows remote hackers to consume large amounts of CPU resources.

The Apache POI PMC released a bugfix version (3.10.1) today.

Solr users are affected by these issues, if they enable the "Apache Solr Content Extraction Library (Solr Cell)" contrib module from the folder "contrib/extraction" of the release tarball.

Users of Apache Solr are strongly advised to keep the module disabled if they don't use it. Alternatively, users of Apache Solr 4.8.0, 4.8.1, or 4.9.0 can update the affected libraries by replacing the vulnerable JAR files in the distribution folder. Users of previous versions have to update their Solr release first, patching older versions is impossible.

To replace the vulnerable JAR files follow these steps:

- Download the Apache POI 3.10.1 binary release: http://poi.apache.org/download.html#POI-3.10.1
- Unzip the archive
- Delete the following files in your "solr-4.X.X/contrib/extraction/lib" folder: 
	# poi-3.10-beta2.jar
	# poi-ooxml-3.10-beta2.jar
	# poi-ooxml-schemas-3.10-beta2.jar
	# poi-scratchpad-3.10-beta2.jar
	# xmlbeans-2.3.0.jar
- Copy the following files from the base folder of the Apache POI distribution to the "solr-4.X.X/contrib/extraction/lib" folder: 
	# poi-3.10.1-20140818.jar
	# poi-ooxml-3.10.1-20140818.jar
	# poi-ooxml-schemas-3.10.1-20140818.jar
	# poi-scratchpad-3.10.1-20140818.jar
- Copy "xmlbeans-2.6.0.jar" from POI's "ooxml-lib/" folder to the "solr-4.X.X/contrib/extraction/lib" folder.
- Verify that the "solr-4.X.X/contrib/extraction/lib" no longer contains any files with version number "3.10-beta2".
- Verify that the folder contains one xmlbeans JAR file with version 2.6.0.

If you just want to disable extraction of Microsoft Office documents, delete the files above and don't replace them. "Solr Cell" will automatically detect this and disable Microsoft Office document extraction.

Coming versions of Apache Solr will have the updated libraries bundled.

Happy Searching and Extracting,
The Apache Lucene Developers

PS: Thanks to Stefan Kopf, Mike Boufford, and Christian Schneider for reporting these issues!

-----
Uwe Schindler
uschindler@apache.org 
Apache Lucene PMC Member / Committer
Bremen, Germany
http://lucene.apache.org/




---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@lucene.apache.org
For additional commands, e-mail: dev-help@lucene.apache.org


---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@lucene.apache.org
For additional commands, e-mail: dev-help@lucene.apache.org