You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@lucene.apache.org by "Joel Bernstein (JIRA)" <ji...@apache.org> on 2015/11/09 21:10:11 UTC
[jira] [Comment Edited] (SOLR-8262) Comment out /stream handler
from sample solrconfig.xml's for security reasons
[ https://issues.apache.org/jira/browse/SOLR-8262?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=14997258#comment-14997258 ]
Joel Bernstein edited comment on SOLR-8262 at 11/9/15 8:09 PM:
---------------------------------------------------------------
The next step is to remove Java serialization from the Streaming API entirely.
The Streaming API will use only the Streaming Expression language for RPC going forward.
was (Author: joel.bernstein):
The next step in this is to remove Java serialization from the Streaming API entirely.
The Streaming API will use only the Streaming Expression language for RPC going forward.
> Comment out /stream handler from sample solrconfig.xml's for security reasons
> -----------------------------------------------------------------------------
>
> Key: SOLR-8262
> URL: https://issues.apache.org/jira/browse/SOLR-8262
> Project: Solr
> Issue Type: Bug
> Reporter: Joel Bernstein
>
> Solr has apache commons-collections in it's classpath.
> *This makes it vulnerable to this security issue https://issues.apache.org/jira/browse/COLLECTIONS-580.
> *The /stream handler uses Java serialization for RPC since Solr 5.1.
> These two combined leave a security hole in Solr that allows arbitrary code to be executed on the server.
> This ticket will comment out the /stream handler from the sample solrconfig.xml's and add a warning to explain the vulnerability.
--
This message was sent by Atlassian JIRA
(v6.3.4#6332)
---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscribe@lucene.apache.org
For additional commands, e-mail: dev-help@lucene.apache.org