svn commit: r452020 - head/security/vuxml

Steve Wills swills at FreeBSD.org
Fri Oct 13 16:42:50 UTC 2017


Author: swills
Date: Fri Oct 13 16:42:49 2017
New Revision: 452020
URL: https://svnweb.freebsd.org/changeset/ports/452020

Log:
  Document solr issue

Modified:
  head/security/vuxml/vuln.xml

Modified: head/security/vuxml/vuln.xml
==============================================================================
--- head/security/vuxml/vuln.xml	Fri Oct 13 16:31:55 2017	(r452019)
+++ head/security/vuxml/vuln.xml	Fri Oct 13 16:42:49 2017	(r452020)
@@ -58,6 +58,35 @@ Notes:
   * Do not forget port variants (linux-f10-libxml2, libxml2, etc.)
 -->
 <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1">
+  <vuln vid="e837390d-0ceb-46b8-9b32-29c1195f5dc7">
+    <topic>solr -- Code execution via entity expansion</topic>
+    <affects>
+      <package>
+	<name>apache-solr</name>
+	<range><ge>5.1</ge><le>6.6.1</le></range>
+	<range><ge>7.0.0</ge><le>7.0.1</le></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Solr developers report:</p>
+	<blockquote cite="http://lucene.472066.n3.nabble.com/Re-Several-critical-vulnerabilities-discovered-in-Apache-Solr-XXE-amp-RCE-td4358308.html">
+	  <p>Lucene XML parser does not explicitly prohibit doctype declaration and expansion of external entities which leads to arbitrary HTTP requests to the local SOLR instance and to bypass all firewall restrictions.</p>
+	  <p>Solr "RunExecutableListener" class can be used to execute arbitrary commands on specific events, for example after each update query. The problem is that such listener can be enabled with any parameters just by using Config API with add-listener command.</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <url>http://lucene.472066.n3.nabble.com/Re-Several-critical-vulnerabilities-discovered-in-Apache-Solr-XXE-amp-RCE-td4358308.html</url>
+      <url>https://marc.info/?l=apache-announce&m=150786685013286</url>
+      <cvename>CVE-2017-12629</cvename>
+    </references>
+    <dates>
+      <discovery>2017-10-13</discovery>
+      <entry>2017-10-13</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="6dc3c61c-e866-4c27-93f7-ae50908594fd">
     <topic>jenkins -- multiple issues</topic>
     <affects>


More information about the svn-ports-all mailing list