On 1/17/2013 2:01 PM, snake wrote:
I think your not understanding the issue.Imagine www.acme.com has created a
collection.
This resides in d:\acme.com\wwwroot\collections

Then they decide to redo their website, or they get a new developer who
decides not to use collections, or they simply move hosts, so they delete
the old one.
The collection is now gone.
Solr now cannot find the config files for that collection since they are
gone, so solr crashes and breaks every other website on the entire server
that is using solr.
The customers have no idea this will happen, no knowledge about having to
get collections removed properly etc, so saying "they should do this and
that" simply wont happen so is not a solution.

Solr has no security measures. If you are giving customers direct access to one or more directories on your Solr server, there are a LOT of ways that they can cause you problems, intentionally or not.

By adding a jar to their data directory and referencing it in their config, they can do just about anything. Custom Solr components could be written that do one or more of the following:

- Tie up all of Solr's memory and cause it to crash.
- Grant general access to the server as the user that runs solr.
- Utilize a security vulnerability and gain admin access.

Changes need to be checked before implementation. If a customer wants to use custom components, that would require extra scrutiny. I can't think of any way to fully protect your server without requiring human intervention for all changes.

Thanks,
Shawn

Reply via email to