On 10/13/2017 7:13 AM, Rick Leir wrote:
> What is the earliest version which was vulnerable?

The XML query parser was added to Solr in version 5.5.  Since that's a
critical part of the remote exploit, that's the minimum version to be
worried about in situations where end users cannot reach Solr directly. 
If end users have direct access to the Solr server, then that opens up a
whole different class of problems.

https://issues.apache.org/jira/browse/SOLR-839

Because the XML parser is enabled by default in Solr without any
configuration, currently the only way to "turn off" that parser is to
redefine the "xmlparser" name to another parser, with a config line like
this in solrconfig.xml:

  <queryParser name="xmlparser" class="solr.ExtendedDismaxQParserPlugin"/>

This config doesn't actually unload the XML parser, but it does
effectively make it inaccessible, because the name is redirected to a
different parser.

I opened this issue:

https://issues.apache.org/jira/browse/SOLR-11495

Thanks,
Shawn

Reply via email to