Description: | Summary: The remote host is missing an update for the Debian 'lucene-solr' package(s) announced via the DLA-2327-1 advisory.
Vulnerability Insight: A security vulnerability was discovered in lucene-solr, an enterprise search server.
The DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's dataConfig parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting from now on, use of this parameter requires setting the Java System property enable.dih.dataConfigParam to true. For example this can be achieved with solr-tomcat by adding -Denable.dih.dataConfigParam=true to JAVA_OPTS in /etc/default/tomcat8.
For Debian 9 stretch, this problem has been fixed in version 3.6.2+dfsg-10+deb9u3.
We recommend that you upgrade your lucene-solr packages.
For the detailed security status of lucene-solr please refer to its security tracker page at: [link moved to references]
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: [link moved to references]
Affected Software/OS: 'lucene-solr' package(s) on Debian 9.
Solution: Please install the updated package(s).
CVSS Score: 9.0
CVSS Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C
|