This is exactly why I asked what Solr version they were running, to see if they
had the vulnerability. We still have no idea about Solr, OS, or JVM versions.

wunder
Walter Underwood
wun...@wunderwood.org
http://observer.wunderwood.org/  (my blog)

> On Aug 26, 2018, at 5:25 AM, Shawn Heisey <apa...@elyograg.org> wrote:
> 
> On 8/25/2018 9:21 PM, Erick Erickson wrote:
>> This is probably CVE-2017-12629, see SOLR-11482, SOLR-11477 for
>> specific versions that have been patched and upgrade. You also need
>> to, as Jan suggested, figure out a way to be absolutely sure that your
>> installation is cleaned before you can be sure that you're protected.
>> 
>> Also see: 
>> https://www.bleepingcomputer.com/news/security/coinminer-campaigns-target-redis-apache-solr-and-windows-servers/
> 
> Erick is awesome.  We can usually count on Erick to research a problem and 
> find the likely culprit.  This is a vulnerability in the way that Solr 
> handles XML parsing.  Certain operations were allowed in the name of 
> flexibility.  It was not realized at the time of implementation that it was 
> opening a security hole.
> 
> Here's the Solr announcement about the related vulnerabilities and the 
> versions with a fix:
> 
> http://mail-archives.us.apache.org/mod_mbox/www-announce/201710.mbox/%3CCAOOKt51UO_6Vy%3Dj8W%3Dx1pMbLW9VJfZyFWz7pAnXJC_OAdSZubA%40mail.gmail.com%3E
> 
> In order to exploit that vulnerability, somebody must have network access to 
> a Solr install.  Such access could be obtained by first breaking into another 
> piece of software, like a web server.
> 
> The recommendation I mentioned about making sure only trusted parties can 
> reach Solr is in the documentation, and on the wiki:
> 
> https://lucene.apache.org/solr/guide/7_4/securing-solr.html
> https://wiki.apache.org/solr/SolrSecurity#Need_for_firewall
> 
> That second link covers some other possible attack vectors.
> 
> Thanks,
> Shawn
> 

Reply via email to