[ 
https://issues.apache.org/jira/browse/SOLR-13971?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17014135#comment-17014135
 ] 

Sachin Pattan commented on SOLR-13971:
--------------------------------------

[~ichattopadhyaya], [~ehatcher] did you get a chance to take a look at the 
patch? 

> Velocity custom template RCE vulnerability
> ------------------------------------------
>
>                 Key: SOLR-13971
>                 URL: https://issues.apache.org/jira/browse/SOLR-13971
>             Project: Solr
>          Issue Type: Bug
>      Security Level: Public(Default Security Level. Issues are Public) 
>    Affects Versions: 5.0, 5.5.5, 6.0, 6.6.5, 7.0, 7.7, 8.0, 8.3
>            Reporter: Ishan Chattopadhyaya
>            Assignee: Ishan Chattopadhyaya
>            Priority: Blocker
>             Fix For: 8.4
>
>         Attachments: SOLR-13971.patch
>
>          Time Spent: 50m
>  Remaining Estimate: 0h
>
> We need to disable this. There is a zero day attack in the wild. 41 stars on 
> this github project: 
> # https://github.com/jas502n/solr_rce
> # https://gist.github.com/s00py/a1ba36a3689fa13759ff910e179fc133
> We need to disable this in a way that cannot be re-enabled using the Config 
> API.



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: issues-unsubscr...@lucene.apache.org
For additional commands, e-mail: issues-h...@lucene.apache.org

Reply via email to