Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2017-12629 #6

Open
rsoika opened this issue Oct 17, 2018 · 0 comments
Open

CVE-2017-12629 #6

rsoika opened this issue Oct 17, 2018 · 0 comments
Labels
Milestone

Comments

@rsoika
Copy link
Member

rsoika commented Oct 17, 2018

high severity
Vulnerable versions: < 7.1.0
Patched version: 7.1.0

Remote code execution occurs in Apache Solr before 7.1 with Apache Lucene before 7.1 by exploiting XXE in conjunction with use of a Config API add-listener command to reach the RunExecutableListener class. Elasticsearch, although it uses Lucene, is NOT vulnerable to this. Note that the XML external entity expansion vulnerability occurs in the XML Query Parser which is available, by default, for any query request with parameters deftype=xmlparser and can be exploited to upload malicious data to the /upload request handler or as Blind XXE using ftp wrapper in order to read arbitrary local files from the Solr server. Note also that the second vulnerability relates to remote code execution using the RunExecutableListener available on all affected versions of Solr.

@rsoika rsoika added the bug label Oct 17, 2018
@rsoika rsoika modified the milestones: 0.0.1, 0.0.2 Oct 17, 2018
rsoika added a commit that referenced this issue Oct 17, 2018
issue #6
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant