Uwe Schindler commented on SOLR-11971:

Hi [~wunder],
as written in my announcement mail, there is no way to disable the "dataConfig" 
 parameter in running installations, unless you completely disable DIH. So your 
options are:
- disable DIH completely (yeah, not so nice)
- update to later version
- instruct your reverse proxy to remove "dataConfig" parameter before passing 
to Solr. I have seen configs for nginx doing similar things with the 
"stream.body" parameters.
- run Solr only on localhost
- install a firewall

> CVE-2018-1308: XXE attack through DIH's dataConfig request parameter
> --------------------------------------------------------------------
>                 Key: SOLR-11971
>                 URL: https://issues.apache.org/jira/browse/SOLR-11971
>             Project: Solr
>          Issue Type: Bug
>      Security Level: Public(Default Security Level. Issues are Public) 
>          Components: contrib - DataImportHandler
>            Reporter: Uwe Schindler
>            Assignee: Uwe Schindler
>            Priority: Major
>             Fix For: 6.6.3, 7.3, master (8.0)
>         Attachments: ApacheSolrDIH-XXE.pdf, SOLR-11971.patch
> We got a security report about an XXE attack when using the 
> {{&dataConfig=<inlinexml>}} of Solr's DataImportHandler. See the attached PDF 
> file with full details (I converted it to PDF, originally it was a DOC file).

This message was sent by Atlassian JIRA

To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
For additional commands, e-mail: dev-h...@lucene.apache.org

Reply via email to