Debian Security Advisory
DLA-1954-1 lucene-solr -- LTS security update
- Date Reported:
- 10 Oct 2019
- Affected Packages:
- lucene-solr
- Vulnerable:
- Yes
- Security database references:
- In Mitre's CVE dictionary: CVE-2019-0193.
- More information:
-
A security vulnerability was discovered in lucene-solr, an enterprise search server.
The DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's
dataConfig
parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting from now on, use of this parameter requires setting the Java System propertyenable.dih.dataConfigParam
to true. For example this can be achieved with solr-tomcat by adding -Denable.dih.dataConfigParam=true to JAVA_OPTS in /etc/default/tomcat7.For Debian 8
Jessie
, this problem has been fixed in version 3.6.2+dfsg-5+deb8u3.We recommend that you upgrade your lucene-solr packages.
Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS