This is probably CVE-2017-12629, see SOLR-11482, SOLR-11477 for
specific versions that have been patched and upgrade. You also need
to, as Jan suggested, figure out a way to be absolutely sure that your
installation is cleaned before you can be sure that you're protected.

Also see: 
https://www.bleepingcomputer.com/news/security/coinminer-campaigns-target-redis-apache-solr-and-windows-servers/

Best,
Erick
On Sat, Aug 25, 2018 at 7:43 PM Tim Casey <tca...@gmail.com> wrote:
>
> I am not sure how solr is exactly set up currently, much less on any
> specific system.  But, for operations which are largely reading, *maybe*
> like a query, you might be able run on a read only partition.
>
> A firewall is a lot less work and a good start, like 90% of the problem.
>
> To do this, you bring up the system with two partitions, one read-only and
> one read-write.  You chroot into the readonly partition and start the query
> server.  This process would only be allowed to run queries and would only
> be read only.  The indexing process, if exposed to the world, would have to
> have a firewall in front of it with white listing of various parts of the
> world.  (Preferably with an ssh enabled exchange, but security is hard,
> lets go shopping.)
>
> This is complicated to set up.  If I recall, we had to build up the used
> parts of the OS as a sub-mount and then run there.  However, once it is
> mounted read only, any subprocess in that root would not be allowed to
> write.  As an simple example, this type of change  requires network logging
> and then a whole lot of qualification to get to useful production.
>
> On Sat, Aug 25, 2018 at 7:10 PM Shawn Heisey <apa...@elyograg.org> wrote:
>
> > On 8/25/2018 12:59 PM, humanitarian wrote:
> > > I am struggling to fight an attack were the solr user is being used to
> > > crate files used for mining cryptocurrencies. The files are being
> > > created in the /var/tmp and /tmp folders.
> > >
> > > It will use 100% of the CPU.
> > >
> > > I am looking for help in stopping these attacks.
> > >
> > > All files are created under the solr user.
> >
> > At least some of what I'm writing is a repeat of what was said in
> > SOLR-12700 -- an issue in Jira with a description that's extremely
> > similar to the subject of this message.
> >
> > The Solr server should never be exposed to untrusted parties, especially
> > the open Internet.  This is probably our number one recommendation for
> > security.  If an attacker cannot reach a server, they cannot compromise it.
> >
> > There are a lot of possible vectors in Solr that could have been used to
> > compromise the system.  Most of the vulnerabilities that have been found
> > are in third-party dependencies that Solr utilizes to create certain
> > functionality.
> >
> > This is not the first time I've encountered this.  On at least one other
> > occasion, a user found weird software on their system running as the
> > solr user.  It turned out to be a crypto-mining program.
> >
> > If you have Solr logs from when your system was compromised, we can
> > check them to see if there's anything useful. There may not be anything
> > useful.   One of the better logs for tracking this sort of thing is the
> > Jetty request log, but this log is not enabled by default in the Solr
> > download.  This log will be the only way you can get the IP address
> > making requests.
> >
> > Lock down your Solr server(s) so that only trusted network addresses can
> > reach them.  This will need to be done outside of Solr.  The operating
> > system will have a firewall available, and your network equipment might
> > also have filtering capability.
> >
> > Thanks,
> > Shawn
> >
> >

Reply via email to