Known Issues in Apache Solr
This topic describes known issues and workarounds for using Solr in this release of Cloudera Runtime.
Technical Service Bulletins
- TSB-2021 389: CVE 2019-17558: Remote Code Execution in Solr through Velocity templates
- Apache Solr in certain CDH, HDP and CDP releases are vulnerable to a Remote Code Execution through the VelocityResponseWriter. A Velocity template can be provided through Velocity templates in a configset `velocity/` directory or as a parameter. A user defined configset could contain renderable, potentially malicious, templates. Parameter provided templates are disabled by default, but can be enabled by setting `params.resource.loader.enabled` by defining a response writer with that setting set to `true`. Defining a response writer requires configuration API access. The fix removed the params resource loader entirely, and only enables the configset-provided template rendering when the configset is `trusted` (has been uploaded by an authenticated user).
- Knowledge article
- For the latest update on this issue see the corresponding Knowledge article: TSB-2021 389: CVE 2019-17558: Remote Code Execution in Solr through Velocity templates
- TSB 2021-497: CVE-2021-27905: Apache Solr SSRF vulnerability with the Replication handler
- The Apache Solr ReplicationHandler (normally registered at "/replication" under a Solr core) has a "masterUrl" (also "leaderUrl" alias) parameter. The “masterUrl” parameter is used to designate another ReplicationHandler on another Solr core to replicate index data into the local core. To help prevent the CVE-2021-27905 SSRF vulnerability, Solr should check these parameters against a similar configuration used for the "shards" parameter.
- Knowledge article
- For the latest update on this issue see the corresponding Knowledge article: TSB 2021-497: CVE-2021-27905: Apache Solr SSRF vulnerability with the Replication handler