This is an automated email from the ASF dual-hosted git repository. jleroux pushed a commit to branch release17.12 in repository https://gitbox.apache.org/repos/asf/ofbiz-plugins.git
The following commit(s) were added to refs/heads/release17.12 by this push: new d84ed77 Fixed: The Solr version included in OFBiz has an SSRF vulnerability (CVE-2021-27905) (OFBIZ-12316) d84ed77 is described below commit d84ed771c2c70187ca283e0c7eb4b29864d1b8f9 Author: Jacques Le Roux <jacques.le.r...@les7arts.com> AuthorDate: Wed Sep 15 13:44:06 2021 +0200 Fixed: The Solr version included in OFBiz has an SSRF vulnerability (CVE-2021-27905) (OFBIZ-12316) Fixes conflicts from cherry pick --- solr/home/solrdefault/conf/solrconfig.xml | 54 ++----------------------------- 1 file changed, 2 insertions(+), 52 deletions(-) diff --git a/solr/home/solrdefault/conf/solrconfig.xml b/solr/home/solrdefault/conf/solrconfig.xml index 11f1099..a64e004 100644 --- a/solr/home/solrdefault/conf/solrconfig.xml +++ b/solr/home/solrdefault/conf/solrconfig.xml @@ -143,13 +143,8 @@ the resource named in 'managedSchemaResourceName', rather than from schema.xml. Note that the managed schema resource CANNOT be named schema.xml. If the managed schema does not exist, Solr will create it after reading schema.xml, then rename -<<<<<<< HEAD 'schema.xml' to 'schema.xml.bak'. -======= - 'schema.xml' to 'schema.xml.bak'. - ->>>>>>> ff03ec24 (Fixed: The Solr version included in OFBiz has an SSRF vulnerability (CVE-2021-27905) (OFBIZ-12316)) Do NOT hand edit the managed schema - external modifications will be ignored and overwritten as a result of schema modification REST API calls. @@ -448,13 +443,8 @@ <!-- Slow Query Threshold (in millis) -<<<<<<< HEAD At high request rates, logging all requests can become a bottleneck -======= - - At high request rates, logging all requests can become a bottleneck ->>>>>>> ff03ec24 (Fixed: The Solr version included in OFBiz has an SSRF vulnerability (CVE-2021-27905) (OFBIZ-12316)) and therefore INFO logging is often turned off. However, it is still useful to be able to set a latency threshold above which a request is considered "slow" and log that request at WARN level so we can @@ -522,13 +512,8 @@ size="512" initialSize="512" autowarmCount="0"/> -<<<<<<< HEAD - - <!-- custom cache currently used by block join --> -======= <!-- custom cache currently used by block join --> ->>>>>>> ff03ec24 (Fixed: The Solr version included in OFBiz has an SSRF vulnerability (CVE-2021-27905) (OFBIZ-12316)) <cache name="perSegFilter" class="solr.search.LRUCache" size="10" @@ -662,8 +647,8 @@ background concurrently. An error is returned if this limit is exceeded. - Recommend values of 1-2 for read-only slaves, higher for - masters w/o cache warming. + Recommend values of 1-2 for read-only replicas, higher for + mains w/o cache warming. --> <maxWarmingSearchers>2</maxWarmingSearchers> @@ -931,13 +916,8 @@ -<<<<<<< HEAD - <!-- A Robust Example - -======= <!-- A Robust Example ->>>>>>> ff03ec24 (Fixed: The Solr version included in OFBiz has an SSRF vulnerability (CVE-2021-27905) (OFBIZ-12316)) This example SearchHandler declaration shows off usage of the SearchHandler with many defaults declared @@ -1190,13 +1170,8 @@ </arr> NOTE: The component registered with the name "debug" will -<<<<<<< HEAD - always be executed after the "last-components" - -======= always be executed after the "last-components" ->>>>>>> ff03ec24 (Fixed: The Solr version included in OFBiz has an SSRF vulnerability (CVE-2021-27905) (OFBIZ-12316)) --> <!-- Spell Check @@ -1286,13 +1261,8 @@ </lst> --> </searchComponent> -<<<<<<< HEAD <!-- A request handler for demonstrating the spellcheck component. -======= - - <!-- A request handler for demonstrating the spellcheck component. ->>>>>>> ff03ec24 (Fixed: The Solr version included in OFBiz has an SSRF vulnerability (CVE-2021-27905) (OFBIZ-12316)) NOTE: This is purely as an example. The whole purpose of the SpellCheckComponent is to hook it into the request handler that @@ -1331,13 +1301,8 @@ <!-- The SuggestComponent in Solr provides users with automatic suggestions for query terms. You can use this to implement a powerful auto-suggest feature in your search application. As with the rest of this solrconfig.xml file, the configuration of this component is purely -<<<<<<< HEAD an example that applies specifically to this configset and example documents. -======= - an example that applies specifically to this configset and example documents. - ->>>>>>> ff03ec24 (Fixed: The Solr version included in OFBiz has an SSRF vulnerability (CVE-2021-27905) (OFBIZ-12316)) More information about this component and other configuration options are described in the "Suggester" section of the reference guide available at http://archive.apache.org/dist/lucene/solr/ref-guide @@ -1614,13 +1579,8 @@ <str name="hl.tag.post"><![CDATA[</b>]]></str> </lst> </fragmentsBuilder> -<<<<<<< HEAD - - <boundaryScanner name="default" -======= <boundaryScanner name="default" ->>>>>>> ff03ec24 (Fixed: The Solr version included in OFBiz has an SSRF vulnerability (CVE-2021-27905) (OFBIZ-12316)) default="true" class="solr.highlight.SimpleBoundaryScanner"> <lst name="defaults"> @@ -1628,13 +1588,8 @@ <str name="hl.bs.chars">.,!? 	 </str> </lst> </boundaryScanner> -<<<<<<< HEAD - - <boundaryScanner name="breakIterator" -======= <boundaryScanner name="breakIterator" ->>>>>>> ff03ec24 (Fixed: The Solr version included in OFBiz has an SSRF vulnerability (CVE-2021-27905) (OFBIZ-12316)) class="solr.highlight.BreakIteratorBoundaryScanner"> <lst name="defaults"> <!-- type should be one of CHARACTER, WORD(default), LINE and SENTENCE --> @@ -1663,13 +1618,8 @@ on the fly based on the hash code of some other fields. This example has overwriteDupes set to false since we are using the id field as the signatureField and Solr will maintain -<<<<<<< HEAD - uniqueness based on that anyway. - -======= uniqueness based on that anyway. ->>>>>>> ff03ec24 (Fixed: The Solr version included in OFBiz has an SSRF vulnerability (CVE-2021-27905) (OFBIZ-12316)) --> <!-- <updateRequestProcessorChain name="dedupe">