Thanks, very helpful. We make an internal Jira for every Solr vulnerability and 
I was checking this one out this week.

wunder
Walter Underwood
wun...@wunderwood.org
http://observer.wunderwood.org/  (my blog)

> On Feb 28, 2019, at 9:23 PM, Tomás Fernández Löbbe <tomasflo...@gmail.com> 
> wrote:
> 
> I updated the description of SOLR-12770
> <https://issues.apache.org/jira/browse/SOLR-12770> a bit. The problem
> stated is that, since the "shards" parameter allows any URL, someone could
> make an insecure Solr instance hit some other (secure) web endpoint. Solr
> would throw an exception, but the error may include information from such
> endpoint (parsing error). I don't believe this would allow access to a
> local file (though, if you know of a way, please report to
> secur...@lucene.apache.org)
> 
> The only way to know (to my knowledge) if your Solr instance was affected
> is by looking at your Solr logs. If you log queries, you should be able to
> see what's being included in the "shards" parameter and detect something
> that's not looking right. Also, if Solr is fooled to hit some other
> endpoint, it would fail with a parsing error, so you should probably see
> exceptions in your logs. The worst case, I guess, depends on how much
> access the Solr process has and how much damage it can cause to an adjacent
> web endpoint via a GET request.
> 
> Note that this can only impact you if your Solr instance can be directly
> accessed by untrusted sources.
> 
> HTH
> 
> On Thu, Feb 28, 2019 at 11:54 AM Jeff Courtade <courtadej...@gmail.com>
> wrote:
> 
>> This particular cve came out in the mailing list. Fed 12th
>> 
>> 
>> CVE-2017-3164 SSRF issue in Apache Solr
>> 
>> I need to know what the exploit for this could be?
>> 
>> 
>> can a user send a bogus shards param via a web request and get a local
>> file?
>> 
>> 
>> What does an attack vector look like for this?
>> 
>> 
>> I am being asked specifically this...
>> 
>> 
>> -          How would we know if the vulnerability in the Solr CVE was
>> taking advantage of? What are signs of us being exploited? What is the
>> worst case scenario with this CVE?
>> 
>> Could someone help me answer this please?
>> 
>> 
>> 
>> 
>> http://mail-archives.apache.org/mod_mbox/www-announce/201902.mbox/%3CCAECwjAVjBN=wO5rYs6ktAX-5=-f5jdfwbbtsm2ttjebgo5j...@mail.gmail.com%3E
>> 
>> 
>> 
>> the bug is
>> 
>> 
>> 
>> https://issues.apache.org/jira/browse/SOLR-12770
>> 
>> 
>> 
>> the mitigation is upgrading to solr 7.7
>> 

Reply via email to