Bug 1473273 (CVE-2017-7660) - CVE-2017-7660 solr: Insufficient authentization for inter-node communication
Summary: CVE-2017-7660 solr: Insufficient authentization for inter-node communication
Keywords:
Status: CLOSED WONTFIX
Alias: CVE-2017-7660
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Red Hat Product Security
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks: 1473274
TreeView+ depends on / blocked
 
Reported: 2017-07-20 11:38 UTC by Andrej Nemec
Modified: 2019-09-29 14:16 UTC (History)
34 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-06-08 03:17:16 UTC
Embargoed:


Attachments (Terms of Use)

Description Andrej Nemec 2017-07-20 11:38:44 UTC
Apache Solr uses a PKI based mechanism to secure inter-node communication when security is enabled. It is possible to create a specially crafted node name that does not exist as part of the cluster and point it to a malicious node. This can trick the nodes in cluster to believe that the malicious node is a member of the cluster. So, if Solr users have enabled BasicAuth authentication mechanism using the BasicAuthPlugin or if the user has implemented a custom Authentication plugin, which does not implement either "HttpClientInterceptorPlugin" or "HttpClientBuilderPlugin", his/her servers are vulnerable to this attack. Users who only use SSL without basic authentication or those who use Kerberos are not affected.

References:

http://mail-archives.us.apache.org/mod_mbox/www-announce/201707.mbox/%3CCAOOKt53EgrybaD%2BiSn-nBbvFdse-szhg%3DhMoDZuvUvyMme-Z%3Dg%40mail.gmail.com%3E

Upstream patch:

http://git-wip-us.apache.org/repos/asf/lucene-solr/commit/2f5ecbcf

Comment 1 Andrej Nemec 2017-07-20 11:41:49 UTC
Upstream issue:

https://issues.apache.org/jira/browse/SOLR-10624

References:

http://seclists.org/bugtraq/2017/Jul/15


Note You need to log in before you can comment on or make changes to this bug.