Uploaded image for project: 'Solr'
  1. Solr
  2. SOLR-10624

Security Vulnerability in secure inter-node communication in Apache Solr

    Details

    • Type: Bug
    • Status: Closed
    • Priority: Critical
    • Resolution: Fixed
    • Affects Version/s: 5.3, 5.5.4, 6.5, 6.5.1
    • Fix Version/s: 5.5.5, 6.6, 7.0
    • Component/s: security, SolrCloud
    • Security Level: Public (Default Security Level. Issues are Public)
    • Labels:
      None

      Description

      Solr uses a PKI based mechanism to secure inter-node communication
      when security is enabled. It is possible to fake it by cleverly
      constructing a node name that does not exist and pointing to the
      attackers machine. This means, the system is only as secure as an
      unprotected Solr while the user believes it is secure.

      who is affected?

      This feature was introduced in SOLR-7849 (Solr 5.3). So, every release
      after 5.3 is vulnerable if they use this feature. Systems using
      BasicAuth are affected and any custom authentication implementations
      using this feature may also be vulnerable. However, Kerberos users are
      unaffected.

      What is the fix?
      The fix includes checking if the node name is actually a member of the
      live_nodes set.

        Attachments

          Activity

            People

            • Assignee:
              noble.paul Noble Paul
              Reporter:
              shalinmangar Shalin Shekhar Mangar
            • Votes:
              0 Vote for this issue
              Watchers:
              3 Start watching this issue

              Dates

              • Created:
                Updated:
                Resolved: