Bug 1501529 (CVE-2017-12629) - CVE-2017-12629 Solr: Code execution via entity expansion
Summary: CVE-2017-12629 Solr: Code execution via entity expansion
Keywords:
Status: CLOSED ERRATA
Alias: CVE-2017-12629
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
urgent
urgent
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 1501838 1501839 1501840 1501841 1504621 1504622 1504624 1504625 1525800
Blocks: 1501395 1501772 1507638 1509818 1527613
TreeView+ depends on / blocked
 
Reported: 2017-10-12 19:11 UTC by Chess Hazlett
Modified: 2024-02-06 04:28 UTC (History)
113 users (show)

Fixed In Version: lucene-solr 5.5.5, lucene-solr 6.6.2, lucene-solr 7.1, lucene-solr 7.2, lucene-solr 8.0
Doc Type: If docs needed, set a value
Doc Text:
It was found that Apache Lucene would accept an object from an unauthenticated user that could be manipulated through subsequent post requests. An attacker could use this flaw to assemble an object that could permit execution of arbitrary code if the server enabled Apache Solr's Config API.
Clone Of:
Environment:
Last Closed: 2017-12-13 09:40:19 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:3123 0 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform security update 2017-11-07 00:17:54 UTC
Red Hat Product Errata RHSA-2017:3124 0 normal SHIPPED_LIVE Moderate: Red Hat JBoss Enterprise Application Platform 7.0 security update 2017-11-07 00:19:02 UTC
Red Hat Product Errata RHSA-2017:3244 0 normal SHIPPED_LIVE Important: Red Hat JBoss Data Grid 7.1.1 security update 2017-11-17 00:52:09 UTC
Red Hat Product Errata RHSA-2017:3451 0 normal SHIPPED_LIVE Moderate: rh-java-common-lucene security update 2017-12-12 22:40:20 UTC
Red Hat Product Errata RHSA-2017:3452 0 normal SHIPPED_LIVE Moderate: rh-java-common-lucene5 security update 2017-12-12 22:47:02 UTC
Red Hat Product Errata RHSA-2018:0002 0 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.0.9 security update on RHEL 6 2018-01-03 15:30:20 UTC
Red Hat Product Errata RHSA-2018:0003 0 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.0.9 security update 2018-01-03 15:20:33 UTC
Red Hat Product Errata RHSA-2018:0004 0 normal SHIPPED_LIVE Important: Red Hat JBoss Enterprise Application Platform 7.0.9 security update on RHEL 7 2018-01-03 15:31:14 UTC
Red Hat Product Errata RHSA-2018:0005 0 normal SHIPPED_LIVE Important: eap7-jboss-ec2-eap security update 2018-01-03 15:49:39 UTC
Red Hat Product Errata RHSA-2020:2561 0 None None None 2020-06-15 16:09:14 UTC
Red Hat Product Errata RHSA-2023:1334 0 None None None 2023-03-20 09:13:13 UTC

Description Chess Hazlett 2017-10-12 19:11:42 UTC
It was found that Apache Solr would accept an object from an unauthenticated user that could be manipulated through subsequent post requests. An attacker could use this flaw to assemble an object that could permit execution of arbitrary code on the server.

Comment 1 Kurt Seifried 2017-10-12 19:20:01 UTC
Satellite 6.2 and later do not ship lucene so are not vulnerable to this. Satellite 6.0 and 6.1 ship lucene v.4 which is not vulnerable to this issue.
SAM 1.x ships an old version of lucene (v.3) that is not vulnerable to this issue, additionally the affected class does not appear to be used.

Comment 4 Chess Hazlett 2017-10-12 20:12:34 UTC
Mitigation:

Until fixes are available, all Solr users are advised to restart their Solr instances with the system parameter `-Ddisable.configEdit=true`. This will disallow any changes to be made to configurations via the Config API. This is a key factor in this vulnerability, since it allows GET requests to add the RunExecutableListener to the config.

This is sufficient to protect from this type of attack, but means you cannot use the edit capabilities of the Config API until further fixes are in place.

Comment 9 Andrej Nemec 2017-10-13 10:17:06 UTC
Created lucene tracking bugs for this issue:

Affects: fedora-all [bug 1501838]


Created lucene3 tracking bugs for this issue:

Affects: fedora-all [bug 1501840]


Created lucene4 tracking bugs for this issue:

Affects: fedora-all [bug 1501841]


Created solr3 tracking bugs for this issue:

Affects: fedora-all [bug 1501839]

Comment 27 Chess Hazlett 2017-10-20 15:34:44 UTC
External References:

https://access.redhat.com/security/vulnerabilities/CVE-2017-12629

Comment 29 errata-xmlrpc 2017-11-06 17:46:02 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 security update

Via RHSA-2017:3124 https://access.redhat.com/errata/RHSA-2017:3124

Comment 30 errata-xmlrpc 2017-11-06 17:58:16 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6

Via RHSA-2017:3123 https://access.redhat.com/errata/RHSA-2017:3123

Comment 33 errata-xmlrpc 2017-11-16 19:53:09 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Data Grid

Via RHSA-2017:3244 https://access.redhat.com/errata/RHSA-2017:3244

Comment 34 errata-xmlrpc 2017-12-12 17:43:51 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS

Via RHSA-2017:3451 https://access.redhat.com/errata/RHSA-2017:3451

Comment 35 errata-xmlrpc 2017-12-12 17:48:07 UTC
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS

Via RHSA-2017:3452 https://access.redhat.com/errata/RHSA-2017:3452

Comment 37 errata-xmlrpc 2018-01-03 10:22:29 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2018:0003 https://access.redhat.com/errata/RHSA-2018:0003

Comment 38 errata-xmlrpc 2018-01-03 10:33:57 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6

Via RHSA-2018:0002 https://access.redhat.com/errata/RHSA-2018:0002

Comment 39 errata-xmlrpc 2018-01-03 10:36:13 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 7

Via RHSA-2018:0004 https://access.redhat.com/errata/RHSA-2018:0004

Comment 40 errata-xmlrpc 2018-01-03 10:53:13 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 7
  Red Hat JBoss Enterprise Application Platform 7.0 for RHEL 6

Via RHSA-2018:0005 https://access.redhat.com/errata/RHSA-2018:0005

Comment 41 errata-xmlrpc 2020-06-15 16:09:09 UTC
This issue has been addressed in the following products:

  Red Hat JBoss Enterprise Application Platform

Via RHSA-2020:2561 https://access.redhat.com/errata/RHSA-2020:2561

Comment 43 Sam Fowler 2020-10-23 07:56:09 UTC
The OCP ose-metering-presto container pulls in a version lucene without the upstream fix, due to its dependency on Elasticsearch:

$ podman run -it --entrypoint /bin/bash --user root registry.redhat.io/openshift4/ose-metering-presto
bash-4.2# find . -name *.jar | grep lucene
./lib/lucene-analyzers-common-7.2.1.jar
./plugin/presto-elasticsearch/lucene-queries-7.0.1.jar
./plugin/presto-elasticsearch/lucene-memory-7.0.1.jar
./plugin/presto-elasticsearch/lucene-spatial3d-7.0.1.jar
./plugin/presto-elasticsearch/lucene-suggest-7.0.1.jar
./plugin/presto-elasticsearch/lucene-join-7.0.1.jar
./plugin/presto-elasticsearch/lucene-highlighter-7.0.1.jar
./plugin/presto-elasticsearch/lucene-backward-codecs-7.0.1.jar
./plugin/presto-elasticsearch/lucene-spatial-7.0.1.jar
./plugin/presto-elasticsearch/lucene-analyzers-common-7.2.1.jar
./plugin/presto-elasticsearch/lucene-queryparser-7.0.1.jar
./plugin/presto-elasticsearch/lucene-grouping-7.0.1.jar
./plugin/presto-elasticsearch/lucene-core-7.0.1.jar
./plugin/presto-elasticsearch/lucene-misc-7.0.1.jar
./plugin/presto-elasticsearch/lucene-spatial-extras-7.0.1.jar
./plugin/presto-elasticsearch/lucene-sandbox-7.0.1.jar

Similarly to Elasticsearch, the presto container is also not affected by this vulnerability.

Comment 44 Sam Fowler 2020-10-23 07:56:21 UTC
Statement:

The following products are not affected by this flaw, as they do not use the vulnerable functionality of either aspect of the issue.
Red Hat JBoss Enterprise Application Platform 6
Red Hat JBoss BPM Suite
Red Hat JBoss BRMS
Red Hat Enterprise Virtualization Manager
Red Hat Single Sign-On 7
Red Hat JBoss Portal Platform 6

Red Hat JBoss Enterprise Application Platform 7 is not affected by this flaw. However, it does ship the vulnerable Lucene class in a dependency to another component. Customers who reuse the lucene-queryparser jar in their applications may be vulnerable to the External Entity Expansion aspect of this flaw. This will be patched in a forthcoming release.

Red Hat JBoss Fuse is not affected by this flaw, as it does not use the vulnerable functionality of either aspect of this flaw. Fuse customers who may be running external Solr servers, while not affected from the Fuse side, are advised to secure their Solr servers as recommended in the mitigation provided.

The following products ship only the Lucene components relevant to this flaw, and are not vulnerable to the second portion of the vulnerability, the code execution exploit. As such, the impact of this flaw has been determined to be Moderate for these respective products:
Red Hat JBoss Data Grid 7 
Red Hat Enterprise Linux 6
Red Hat Software Collections 2.4

This issue did not affect the versions of lucene as shipped with Red Hat Enterprise Linux 5.

This issue does not affect Elasticsearch as shipped in OpenShift Container Platform.

Comment 45 Ted Jongseok Won 2020-11-10 04:20:17 UTC
Downstream fixed version: https://maven.repository.redhat.com/ga/org/apache/lucene/lucene-queryparser/5.3.1.redhat-2/

Comment 48 errata-xmlrpc 2023-03-20 09:13:09 UTC
This issue has been addressed in the following products:

  Red Hat Process Automation

Via RHSA-2023:1334 https://access.redhat.com/errata/RHSA-2023:1334


Note You need to log in before you can comment on or make changes to this bug.