Date: Fri, 13 Oct 2017 16:42:49 +0000 (UTC) From: Steve Wills <swills@FreeBSD.org> To: ports-committers@freebsd.org, svn-ports-all@freebsd.org, svn-ports-head@freebsd.org Subject: svn commit: r452020 - head/security/vuxml Message-ID: <201710131642.v9DGgnDV094403@repo.freebsd.org>
next in thread | raw e-mail | index | archive | help
Author: swills Date: Fri Oct 13 16:42:49 2017 New Revision: 452020 URL: https://svnweb.freebsd.org/changeset/ports/452020 Log: Document solr issue Modified: head/security/vuxml/vuln.xml Modified: head/security/vuxml/vuln.xml ============================================================================== --- head/security/vuxml/vuln.xml Fri Oct 13 16:31:55 2017 (r452019) +++ head/security/vuxml/vuln.xml Fri Oct 13 16:42:49 2017 (r452020) @@ -58,6 +58,35 @@ Notes: * Do not forget port variants (linux-f10-libxml2, libxml2, etc.) --> <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> + <vuln vid="e837390d-0ceb-46b8-9b32-29c1195f5dc7"> + <topic>solr -- Code execution via entity expansion</topic> + <affects> + <package> + <name>apache-solr</name> + <range><ge>5.1</ge><le>6.6.1</le></range> + <range><ge>7.0.0</ge><le>7.0.1</le></range> + </package> + </affects> + <description> + <body xmlns="http://www.w3.org/1999/xhtml"> + <p>Solr developers report:</p> + <blockquote cite="http://lucene.472066.n3.nabble.com/Re-Several-critical-vulnerabilities-discovered-in-Apache-Solr-XXE-amp-RCE-td4358308.html"> + <p>Lucene XML parser does not explicitly prohibit doctype declaration and expansion of external entities which leads to arbitrary HTTP requests to the local SOLR instance and to bypass all firewall restrictions.</p> + <p>Solr "RunExecutableListener" class can be used to execute arbitrary commands on specific events, for example after each update query. The problem is that such listener can be enabled with any parameters just by using Config API with add-listener command.</p> + </blockquote> + </body> + </description> + <references> + <url>http://lucene.472066.n3.nabble.com/Re-Several-critical-vulnerabilities-discovered-in-Apache-Solr-XXE-amp-RCE-td4358308.html</url> + <url>https://marc.info/?l=apache-announce&m=150786685013286</url> + <cvename>CVE-2017-12629</cvename> + </references> + <dates> + <discovery>2017-10-13</discovery> + <entry>2017-10-13</entry> + </dates> + </vuln> + <vuln vid="6dc3c61c-e866-4c27-93f7-ae50908594fd"> <topic>jenkins -- multiple issues</topic> <affects>
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201710131642.v9DGgnDV094403>