This is probably CVE-2017-12629, see SOLR-11482, SOLR-11477 for specific versions that have been patched and upgrade. You also need to, as Jan suggested, figure out a way to be absolutely sure that your installation is cleaned before you can be sure that you're protected.
Also see: https://www.bleepingcomputer.com/news/security/coinminer-campaigns-target-redis-apache-solr-and-windows-servers/ Best, Erick On Sat, Aug 25, 2018 at 7:43 PM Tim Casey <tca...@gmail.com> wrote: > > I am not sure how solr is exactly set up currently, much less on any > specific system. But, for operations which are largely reading, *maybe* > like a query, you might be able run on a read only partition. > > A firewall is a lot less work and a good start, like 90% of the problem. > > To do this, you bring up the system with two partitions, one read-only and > one read-write. You chroot into the readonly partition and start the query > server. This process would only be allowed to run queries and would only > be read only. The indexing process, if exposed to the world, would have to > have a firewall in front of it with white listing of various parts of the > world. (Preferably with an ssh enabled exchange, but security is hard, > lets go shopping.) > > This is complicated to set up. If I recall, we had to build up the used > parts of the OS as a sub-mount and then run there. However, once it is > mounted read only, any subprocess in that root would not be allowed to > write. As an simple example, this type of change requires network logging > and then a whole lot of qualification to get to useful production. > > On Sat, Aug 25, 2018 at 7:10 PM Shawn Heisey <apa...@elyograg.org> wrote: > > > On 8/25/2018 12:59 PM, humanitarian wrote: > > > I am struggling to fight an attack were the solr user is being used to > > > crate files used for mining cryptocurrencies. The files are being > > > created in the /var/tmp and /tmp folders. > > > > > > It will use 100% of the CPU. > > > > > > I am looking for help in stopping these attacks. > > > > > > All files are created under the solr user. > > > > At least some of what I'm writing is a repeat of what was said in > > SOLR-12700 -- an issue in Jira with a description that's extremely > > similar to the subject of this message. > > > > The Solr server should never be exposed to untrusted parties, especially > > the open Internet. This is probably our number one recommendation for > > security. If an attacker cannot reach a server, they cannot compromise it. > > > > There are a lot of possible vectors in Solr that could have been used to > > compromise the system. Most of the vulnerabilities that have been found > > are in third-party dependencies that Solr utilizes to create certain > > functionality. > > > > This is not the first time I've encountered this. On at least one other > > occasion, a user found weird software on their system running as the > > solr user. It turned out to be a crypto-mining program. > > > > If you have Solr logs from when your system was compromised, we can > > check them to see if there's anything useful. There may not be anything > > useful. One of the better logs for tracking this sort of thing is the > > Jetty request log, but this log is not enabled by default in the Solr > > download. This log will be the only way you can get the IP address > > making requests. > > > > Lock down your Solr server(s) so that only trusted network addresses can > > reach them. This will need to be done outside of Solr. The operating > > system will have a firewall available, and your network equipment might > > also have filtering capability. > > > > Thanks, > > Shawn > > > >