This is an automated email from the ASF dual-hosted git repository.

git-site-role pushed a commit to branch asf-site
in repository https://gitbox.apache.org/repos/asf/solr-site.git


The following commit(s) were added to refs/heads/asf-site by this push:
     new 019df2b  Automatic Site Publish by Buildbot
019df2b is described below

commit 019df2b94de1ff7e6f97af2aa18ffd416d937e92
Author: buildbot <[email protected]>
AuthorDate: Sat Dec 18 00:07:07 2021 +0000

    Automatic Site Publish by Buildbot
---
 output/feeds/all.atom.xml           | 23 ++++++++++++-
 output/feeds/solr/security.atom.xml | 23 ++++++++++++-
 output/index.html                   |  2 +-
 output/news.html                    | 20 +++++++++++
 output/operator/index.html          |  2 +-
 output/security.html                | 66 +++++++++++++++----------------------
 6 files changed, 92 insertions(+), 44 deletions(-)

diff --git a/output/feeds/all.atom.xml b/output/feeds/all.atom.xml
index 47fa79b..72ba862 100644
--- a/output/feeds/all.atom.xml
+++ b/output/feeds/all.atom.xml
@@ -1,5 +1,26 @@
 <?xml version="1.0" encoding="utf-8"?>
-<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr</title><link 
href="/" rel="alternate"></link><link href="/feeds/all.atom.xml" 
rel="self"></link><id>/</id><updated>2021-12-16T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>Apache
 Solr™ 8.11.1 available</title><link href="/apache-solrtm-8111-available.html" 
rel="alternate"></link><published>2021-12-16T00:00:00+00:00</published><updated>2021-12-16T00:00:00+00:00</updated><author><name>Solr
 Develo [...]
+<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr</title><link 
href="/" rel="alternate"></link><link href="/feeds/all.atom.xml" 
rel="self"></link><id>/</id><updated>2021-12-18T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>CVE-2021-44548:
 Apache Solr information disclosure vulnerability through 
DataImportHandler</title><link 
href="/cve-2021-44548-apache-solr-information-disclosure-vulnerability-through-dataimporthandler.html"
 rel="alternate"></ [...]
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
+All versions prior to 8.11.1. Affected platforms: Windows.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+An Improper Input Validation vulnerability in DataImportHandler of Apache Solr 
allows an attacker to provide a Windows UNC path resulting in an SMB network 
call being made from the Solr host to another host on 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
+All versions prior to 8.11.1. Affected platforms: Windows.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+An Improper Input Validation vulnerability in DataImportHandler of Apache Solr 
allows an attacker to provide a Windows UNC path resulting in an SMB network 
call being made from the Solr host to another host on the network. If the 
attacker has wider access to the network, this may lead to SMB attacks, which 
may result in:&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;The exfiltration of sensitive data such as OS user hashes (NTLM/LM 
hashes),&lt;/li&gt;
+&lt;li&gt;In case of misconfigured systems, SMB Relay Attacks which can lead 
to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code 
Execution&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;This issue affects all Apache Solr versions prior to 8.11.1. This 
issue only affects Windows.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
+Upgrade to Solr 8.11.1, and/or ensure only trusted clients can make requests 
to Solr's DataImport handler.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;&lt;br&gt;
+Apache Solr would like to thank LaiHan of Nsfocus security team for reporting 
the issue&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
+Jira issue &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-15826"&gt;SOLR-15826&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>Apache Solr™ 8.11.1 
available</title><link href="/apache-solrtm-8111-available.html" 
rel="alternate"></link><published>2021-12-16T00:00:00+00:00</published><updated>2021-12-16T00:00:00+00:00</updated><author><name>Solr
 
Developers</name></author><id>tag:None,2021-12-16:/apache-solrtm-8111-available.html</id><sum
 [...]
 &lt;p&gt;Solr is the popular, blazing fast, open source NoSQL search platform 
from the Apache Lucene project. Its major features include powerful full-text 
search, hit highlighting, faceted search, dynamic clustering, database 
integration, rich document handling, and …&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;The Lucene PMC is pleased to announce the release of 
Apache Solr 8.11.1.&lt;/p&gt;
 &lt;p&gt;Solr is the popular, blazing fast, open source NoSQL search platform 
from the Apache Lucene project. Its major features include powerful full-text 
search, hit highlighting, faceted search, dynamic clustering, database 
integration, rich document handling, and geospatial search. Solr is highly 
scalable, providing fault tolerant distributed search and indexing, and powers 
the search and navigation features of many of the world's largest internet 
sites.&lt;/p&gt;
 &lt;p&gt;Solr 8.11.1 is available for immediate download at:&lt;/p&gt;
diff --git a/output/feeds/solr/security.atom.xml 
b/output/feeds/solr/security.atom.xml
index 1f12407..4e6364e 100644
--- a/output/feeds/solr/security.atom.xml
+++ b/output/feeds/solr/security.atom.xml
@@ -1,5 +1,26 @@
 <?xml version="1.0" encoding="utf-8"?>
-<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr - 
solr/security</title><link href="/" rel="alternate"></link><link 
href="/feeds/solr/security.atom.xml" 
rel="self"></link><id>/</id><updated>2021-12-10T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>Apache
 Solr affected by Apache Log4J CVE-2021-44228</title><link 
href="/apache-solr-affected-by-apache-log4j-cve-2021-44228.html" 
rel="alternate"></link><published>2021-12-10T00:00:00+00:00</publishe [...]
+<feed xmlns="http://www.w3.org/2005/Atom";><title>Apache Solr - 
solr/security</title><link href="/" rel="alternate"></link><link 
href="/feeds/solr/security.atom.xml" 
rel="self"></link><id>/</id><updated>2021-12-18T00:00:00+00:00</updated><subtitle></subtitle><subtitle></subtitle><entry><title>CVE-2021-44548:
 Apache Solr information disclosure vulnerability through 
DataImportHandler</title><link 
href="/cve-2021-44548-apache-solr-information-disclosure-vulnerability-through-dataimporthandle
 [...]
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
+All versions prior to 8.11.1. Affected platforms: Windows.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+An Improper Input Validation vulnerability in DataImportHandler of Apache Solr 
allows an attacker to provide a Windows UNC path resulting in an SMB network 
call being made from the Solr host to another host on 
…&lt;/p&gt;</summary><content 
type="html">&lt;p&gt;&lt;strong&gt;Severity:&lt;/strong&gt;&lt;br&gt;
+Moderate&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;&lt;br&gt;
+All versions prior to 8.11.1. Affected platforms: Windows.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Description:&lt;/strong&gt;&lt;br&gt;
+An Improper Input Validation vulnerability in DataImportHandler of Apache Solr 
allows an attacker to provide a Windows UNC path resulting in an SMB network 
call being made from the Solr host to another host on the network. If the 
attacker has wider access to the network, this may lead to SMB attacks, which 
may result in:&lt;/p&gt;
+&lt;ul&gt;
+&lt;li&gt;The exfiltration of sensitive data such as OS user hashes (NTLM/LM 
hashes),&lt;/li&gt;
+&lt;li&gt;In case of misconfigured systems, SMB Relay Attacks which can lead 
to user impersonation on SMB Shares or, in a worse-case scenario, Remote Code 
Execution&lt;/li&gt;
+&lt;/ul&gt;
+&lt;p&gt;This issue affects all Apache Solr versions prior to 8.11.1. This 
issue only affects Windows.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Mitigation:&lt;/strong&gt;&lt;br&gt;
+Upgrade to Solr 8.11.1, and/or ensure only trusted clients can make requests 
to Solr's DataImport handler.&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;Credit:&lt;/strong&gt;&lt;br&gt;
+Apache Solr would like to thank LaiHan of Nsfocus security team for reporting 
the issue&lt;/p&gt;
+&lt;p&gt;&lt;strong&gt;References:&lt;/strong&gt;&lt;br&gt;
+Jira issue &lt;a 
href="https://issues.apache.org/jira/browse/SOLR-15826"&gt;SOLR-15826&lt;/a&gt;&lt;/p&gt;</content><category
 term="solr/security"></category></entry><entry><title>Apache Solr affected by 
Apache Log4J CVE-2021-44228</title><link 
href="/apache-solr-affected-by-apache-log4j-cve-2021-44228.html" 
rel="alternate"></link><published>2021-12-10T00:00:00+00:00</published><updated>2021-12-10T00:00:00+00:00</updated><author><name>Solr
 Developers</name></author><id>tag:None,2021-12-1 [...]
 Critical&lt;/p&gt;
 &lt;p&gt;&lt;strong&gt;Versions Affected:&lt;/strong&gt;
 7.4.0 to 7.7.3, 8.0.0 to 8.11.0&lt;/p&gt;
diff --git a/output/index.html b/output/index.html
index ab2de45..f162f74 100644
--- a/output/index.html
+++ b/output/index.html
@@ -112,7 +112,7 @@
 </div>
 
 <div class="header-fill"></div>
-<section class="security" latest-date="2021-12-10">
+<section class="security" latest-date="2021-12-18">
   <div class="row">
     <div class="large-12 columns text-center">
       <h2><a href="security.html">&#x26A0; There are recent security 
announcements. Read more on the Security page.</a></h2>
diff --git a/output/news.html b/output/news.html
index df9727c..2d00237 100644
--- a/output/news.html
+++ b/output/news.html
@@ -132,6 +132,26 @@
   <h1 id="solr-news">Solr<sup>™</sup> News<a class="headerlink" 
href="#solr-news" title="Permanent link">¶</a></h1>
   <p>You may also read these news as an <a 
href="/feeds/solr/news.atom.xml">ATOM feed</a>.</p>
 
+  <h2 
id="cve-2021-44548-apache-solr-information-disclosure-vulnerability-through-dataimporthandler">18
 December 2021, CVE-2021-44548: Apache Solr information disclosure 
vulnerability through DataImportHandler
+    <a class="headerlink" 
href="#cve-2021-44548-apache-solr-information-disclosure-vulnerability-through-dataimporthandler"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity:</strong><br>
+Moderate</p>
+<p><strong>Versions Affected:</strong><br>
+All versions prior to 8.11.1. Affected platforms: Windows.</p>
+<p><strong>Description:</strong><br>
+An Improper Input Validation vulnerability in DataImportHandler of Apache Solr 
allows an attacker to provide a Windows UNC path resulting in an SMB network 
call being made from the Solr host to another host on the network. If the 
attacker has wider access to the network, this may lead to SMB attacks, which 
may result in:</p>
+<ul>
+<li>The exfiltration of sensitive data such as OS user hashes (NTLM/LM 
hashes),</li>
+<li>In case of misconfigured systems, SMB Relay Attacks which can lead to user 
impersonation on SMB Shares or, in a worse-case scenario, Remote Code 
Execution</li>
+</ul>
+<p>This issue affects all Apache Solr versions prior to 8.11.1. This issue 
only affects Windows.</p>
+<p><strong>Mitigation:</strong><br>
+Upgrade to Solr 8.11.1, and/or ensure only trusted clients can make requests 
to Solr's DataImport handler.</p>
+<p><strong>Credit:</strong><br>
+Apache Solr would like to thank LaiHan of Nsfocus security team for reporting 
the issue</p>
+<p><strong>References:</strong><br>
+Jira issue <a 
href="https://issues.apache.org/jira/browse/SOLR-15826";>SOLR-15826</a></p>
   <h2 id="apache-solrtm-8111-available">16 December 2021, Apache Solr™ 8.11.1 
available
     <a class="headerlink" href="#apache-solrtm-8111-available" 
title="Permanent link">¶</a>
   </h2>
diff --git a/output/operator/index.html b/output/operator/index.html
index ce2e06b..273d35f 100644
--- a/output/operator/index.html
+++ b/output/operator/index.html
@@ -107,7 +107,7 @@
 </div>
 
 <div class="header-fill"></div>
-<section class="security" latest-date="2021-12-10">
+<section class="security" latest-date="2021-12-18">
   <div class="row">
     <div class="large-12 columns text-center">
       <h2><a href="/security.html">&#x26A0; There are recent security 
announcements. Read more on the Solr Security page.</a></h2>
diff --git a/output/security.html b/output/security.html
index e750fe0..6cec587 100644
--- a/output/security.html
+++ b/output/security.html
@@ -140,6 +140,11 @@ Then please disclose responsibly by following <a 
href="https://www.apache.org/se
             <th>Announcement</th>
         </tr>
         <tr>
+            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2021-44548";>CVE-2021-44548</a></td>
+            <td>2021-12-18</td>
+            <td><a 
href="#cve-2021-44548-apache-solr-information-disclosure-vulnerability-through-dataimporthandler">Apache
 Solr information disclosure vulnerability through DataImportHandler</a></td>
+        </tr>
+        <tr>
             <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2021-44228";>CVE-2021-44228</a></td>
             <td>2021-12-10</td>
             <td><a 
href="#apache-solr-affected-by-apache-log4j-cve-2021-44228">Apache Solr 
affected by Apache Log4J CVE-2021-44228</a></td>
@@ -209,13 +214,29 @@ Then please disclose responsibly by following <a 
href="https://www.apache.org/se
             <td>2018-04-08</td>
             <td><a 
href="#cve-2018-1308-xxe-attack-through-apache-solrs-dihs-dataconfig-request-parameter">XXE
 attack through Apache Solr's DIH's dataConfig request parameter</a></td>
         </tr>
-        <tr>
-            <td><a 
href="https://nvd.nist.gov/vuln/detail/CVE-2016-6809";>CVE-2016-6809</a></td>
-            <td>2017-10-26</td>
-            <td><a 
href="#cve-2016-6809-java-code-execution-for-serialized-objects-embedded-in-matlab-files-parsed-by-apache-solr-using-tika">Java
 code execution for serialized objects embedded in MATLAB files parsed by 
Apache Solr using Tika</a></td>
-        </tr>
     </table>
 
+  <h2 
id="cve-2021-44548-apache-solr-information-disclosure-vulnerability-through-dataimporthandler">2021-12-18,
 CVE-2021-44548: Apache Solr information disclosure vulnerability through 
DataImportHandler
+    <a class="headerlink" 
href="#cve-2021-44548-apache-solr-information-disclosure-vulnerability-through-dataimporthandler"
 title="Permanent link">¶</a>
+  </h2>
+  <p><strong>Severity:</strong><br>
+Moderate</p>
+<p><strong>Versions Affected:</strong><br>
+All versions prior to 8.11.1. Affected platforms: Windows.</p>
+<p><strong>Description:</strong><br>
+An Improper Input Validation vulnerability in DataImportHandler of Apache Solr 
allows an attacker to provide a Windows UNC path resulting in an SMB network 
call being made from the Solr host to another host on the network. If the 
attacker has wider access to the network, this may lead to SMB attacks, which 
may result in:</p>
+<ul>
+<li>The exfiltration of sensitive data such as OS user hashes (NTLM/LM 
hashes),</li>
+<li>In case of misconfigured systems, SMB Relay Attacks which can lead to user 
impersonation on SMB Shares or, in a worse-case scenario, Remote Code 
Execution</li>
+</ul>
+<p>This issue affects all Apache Solr versions prior to 8.11.1. This issue 
only affects Windows.</p>
+<p><strong>Mitigation:</strong><br>
+Upgrade to Solr 8.11.1, and/or ensure only trusted clients can make requests 
to Solr's DataImport handler.</p>
+<p><strong>Credit:</strong><br>
+Apache Solr would like to thank LaiHan of Nsfocus security team for reporting 
the issue</p>
+<p><strong>References:</strong><br>
+Jira issue <a 
href="https://issues.apache.org/jira/browse/SOLR-15826";>SOLR-15826</a></p>
+  <hr/>
   <h2 id="apache-solr-affected-by-apache-log4j-cve-2021-44228">2021-12-10, 
Apache Solr affected by Apache Log4J CVE-2021-44228
     <a class="headerlink" 
href="#apache-solr-affected-by-apache-log4j-cve-2021-44228" title="Permanent 
link">¶</a>
   </h2>
@@ -625,41 +646,6 @@ secure Solr servers.</p>
 <p>[1] <a 
href="https://issues.apache.org/jira/browse/SOLR-11971";>https://issues.apache.org/jira/browse/SOLR-11971</a><br>
 [2] <a 
href="https://cwiki.apache.org/confluence/display/solr/SolrSecurity";>https://cwiki.apache.org/confluence/display/solr/SolrSecurity</a></p>
   <hr/>
-  <h2 
id="cve-2016-6809-java-code-execution-for-serialized-objects-embedded-in-matlab-files-parsed-by-apache-solr-using-tika">2017-10-26,
 CVE-2016-6809: Java code execution for serialized objects embedded in MATLAB 
files parsed by Apache Solr using Tika
-    <a class="headerlink" 
href="#cve-2016-6809-java-code-execution-for-serialized-objects-embedded-in-matlab-files-parsed-by-apache-solr-using-tika"
 title="Permanent link">¶</a>
-  </h2>
-  <p><strong>Severity:</strong> Important</p>
-<p><strong>Vendor:</strong><br>
-The Apache Software Foundation</p>
-<p><strong>Versions Affected:</strong></p>
-<ul>
-<li>Solr 5.0.0 to 5.5.4</li>
-<li>Solr 6.0.0 to 6.6.1</li>
-<li>Solr 7.0.0 to 7.0.1</li>
-</ul>
-<p><strong>Description:</strong><br>
-Apache Solr uses Apache Tika for parsing binary file types such as
-doc, xls, pdf etc. Apache Tika wraps the jmatio parser
-(https://github.com/gradusnikov/jmatio) to handle MATLAB files. The
-parser uses native deserialization on serialized Java objects embedded
-in MATLAB files. A malicious user could inject arbitrary code into a
-MATLAB file that would be executed when the object is deserialized.</p>
-<p>This vulnerability was originally described at
-http://mail-archives.apache.org/mod_mbox/tika-user/201611.mbox/%3C2125912914.1308916.1478787314903%40mail.yahoo.com%3E</p>
-<p><strong>Mitigation:</strong><br>
-Users are advised to upgrade to either Solr 5.5.5 or Solr 6.6.2 or Solr 7.1.0
-releases which have fixed this vulnerability.</p>
-<p>Solr 5.5.5 upgrades the jmatio parser to v1.2 and disables the Java
-deserialisation support to protect against this vulnerability.</p>
-<p>Solr 6.6.2 and Solr 7.1.0 have upgraded the bundled Tika to v1.16.</p>
-<p>Once upgrade is complete, no other steps are required.</p>
-<p><strong>References:</strong></p>
-<ul>
-<li><a 
href="https://issues.apache.org/jira/browse/SOLR-11486";>https://issues.apache.org/jira/browse/SOLR-11486</a></li>
-<li><a 
href="https://issues.apache.org/jira/browse/SOLR-10335";>https://issues.apache.org/jira/browse/SOLR-10335</a></li>
-<li><a 
href="https://cwiki.apache.org/confluence/display/solr/SolrSecurity";>https://cwiki.apache.org/confluence/display/solr/SolrSecurity</a></li>
-</ul>
-  <hr/>
 </div>
   </div>
 </div>

Reply via email to