Security Vulnerability Consultation

classic Classic list List threaded Threaded
3 messages Options
Reply | Threaded
Open this post in threaded view
|

Security Vulnerability Consultation

Huawei PSIRT
Dear,

 

    This is Huawei PSIRT. We have learned that a security researcher
<https://gist.github.com/s00py/a1ba36a3689fa13759ff910e179fc133> released an
Apache Solr RCE suspected vulnerability on October 31, 2019.

    The links are as follow:
https://meterpreter.org/unpatch-apache-solr-remote-command-execution-vulnera
bility-alert/

https://gist.github.com/s00py/a1ba36a3689fa13759ff910e179fc133

     

     We want to confirm if the issue exists. If it exists, when will the
patches be released ?

     Looking forward to your reply. Thank you.

 

Best Regards,

Huawei PSIRT

Reply | Threaded
Open this post in threaded view
|

Re: Security Vulnerability Consultation

Erik Hatcher-4
Hi -

There are many "vulnerabilities" that can be enabled when one has administrative access to Solr, with this being one example.   The setting mentioned defaults to false, and requires admin access to enable.

The warning from the Solr Reference Guide is worth repeating here:

>> No Solr API, including the Admin UI, is designed to be exposed to non-trusted parties.

Turning on authentication is the first step I'd recommend.

        Erik


> On Oct 31, 2019, at 11:45 PM, Huawei PSIRT <[hidden email]> wrote:
>
> Dear,
>
>
>
>    This is Huawei PSIRT. We have learned that a security researcher
> <https://gist.github.com/s00py/a1ba36a3689fa13759ff910e179fc133> released an
> Apache Solr RCE suspected vulnerability on October 31, 2019.
>
>    The links are as follow:
> https://meterpreter.org/unpatch-apache-solr-remote-command-execution-vulnera
> bility-alert/
>
> https://gist.github.com/s00py/a1ba36a3689fa13759ff910e179fc133
>
>
>
>     We want to confirm if the issue exists. If it exists, when will the
> patches be released ?
>
>     Looking forward to your reply. Thank you.
>
>
>
> Best Regards,
>
> Huawei PSIRT
>

Reply | Threaded
Open this post in threaded view
|

答复: Security Vulnerability Consultation

Huawei PSIRT
Dear Erik,

    Thank you for your fast reply.

Best Regards,
Huawei PSIRT



-----邮件原件-----
发件人: Erik Hatcher [mailto:[hidden email]]
发送时间: 2019年11月1日 21:50
收件人: [hidden email]
抄送: Huawei PSIRT <[hidden email]>; Renling <[hidden email]>
主题: Re: Security Vulnerability Consultation

Hi -

There are many "vulnerabilities" that can be enabled when one has
administrative access to Solr, with this being one example.   The setting
mentioned defaults to false, and requires admin access to enable.

The warning from the Solr Reference Guide is worth repeating here:

>> No Solr API, including the Admin UI, is designed to be exposed to
non-trusted parties.

Turning on authentication is the first step I'd recommend.

        Erik


> On Oct 31, 2019, at 11:45 PM, Huawei PSIRT <[hidden email]> wrote:
>
> Dear,
>
>
>
>    This is Huawei PSIRT. We have learned that a security researcher
> <https://gist.github.com/s00py/a1ba36a3689fa13759ff910e179fc133>
> released an Apache Solr RCE suspected vulnerability on October 31, 2019.
>
>    The links are as follow:
> https://meterpreter.org/unpatch-apache-solr-remote-command-execution-v
> ulnera
> bility-alert/
>
> https://gist.github.com/s00py/a1ba36a3689fa13759ff910e179fc133
>
>
>
>     We want to confirm if the issue exists. If it exists, when will
> the patches be released ?
>
>     Looking forward to your reply. Thank you.
>
>
>
> Best Regards,
>
> Huawei PSIRT
>