This is an automated email from the ASF dual-hosted git repository.

github-bot pushed a commit to branch asf-staging
in repository https://gitbox.apache.org/repos/asf/solr-site.git


The following commit(s) were added to refs/heads/asf-staging by this push:
     new fd76daa34 Commit build products
fd76daa34 is described below

commit fd76daa34e323dd7b1d3c5046e92d43ca039bde5
Author: Build Pelican (action) <[email protected]>
AuthorDate: Fri Jun 21 07:29:46 2024 +0000

    Commit build products
---
 output/security.html | 354 +++++++++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 354 insertions(+)

diff --git a/output/security.html b/output/security.html
index 16fc069d3..94f223598 100644
--- a/output/security.html
+++ b/output/security.html
@@ -656,6 +656,360 @@ Github user <code>s00py</code></p>
         <th>state</th>
         <th>detail</th>
       </tr>
+      <!-- BEGIN STATIC TABLE SOLR-17339 -->
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2022-33980";>CVE-2022-33980</a>       
 </td>
+        <td>
+          &lt; 9.1
+        </td>
+        <td>
+          commons-configuration2-2.7.jar        </td>
+        <td>not affected</td>
+        <td>Solr uses commons-configuration2 for "hadoop-auth" only (for 
Kerberos). It is only used for loading Hadoop configuration files that would 
only ever be provided by trusted administrators, not externally 
(untrusted).</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2022-42889";>CVE-2022-42889</a>       
 </td>
+        <td>
+          &lt; 9.1
+        </td>
+        <td>
+          commons-text-1.9.jar        </td>
+        <td>not affected</td>
+        <td>Solr uses commons-text directly 
(StringEscapeUtils.escapeEcmaScript) in LoadAdminUiServlet that is not 
vulnerable. Solr also has a "hadoop-auth" module that uses Apache Hadoop which 
uses commons-text through commons-configuration2. For Solr, the concern is 
limited to loading Hadoop configuration files that would only ever be provided 
by trusted administrators, not externally (untrusted).</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2022-25168";>CVE-2022-25168</a>       
 </td>
+        <td>
+          &lt; 9.1
+        </td>
+        <td>
+          hadoop-common-3.2.2.jar        </td>
+        <td>not affected</td>
+        <td>The vulnerable code won't be used by Solr because Solr only is 
only using HDFS as a client.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2021-44832";>CVE-2021-44832</a>       
 </td>
+        <td>
+          7.4-8.11.1
+        </td>
+        <td>
+          log4j-core-2.14.1.jar,             log4j-core-2.16.0.jar        </td>
+        <td>not affected</td>
+        <td>Solr's default log configuration doesn't use JDBCAppender and we 
don't imagine a user would want to use it or other obscure appenders.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2021-45105";>CVE-2021-45105</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2021-45046";>CVE-2021-45046</a>       
 </td>
+        <td>
+          7.4-8.11.1
+        </td>
+        <td>
+          log4j-core-2.14.1.jar,             log4j-core-2.16.0.jar        </td>
+        <td>not affected</td>
+        <td>The MDC data used by Solr are for the collection, shard, replica, 
core and node names, and a potential trace id, which are all sanitized. 
Furthermore, Solr's default log configuration doesn't use double-dollar-sign 
and we don't imagine a user would want to do that.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2020-13955";>CVE-2020-13955</a>       
 </td>
+        <td>
+          8.1.0- today
+        </td>
+        <td>
+          avatica-core-1.13.0.jar,             calcite-core-1.18.0.jar        
</td>
+        <td>not affected</td>
+        <td>Solr's SQL adapter does not use the vulnerable class "HttpUtils". 
Calcite only used it to talk to Druid or Splunk.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2018-10237";>CVE-2018-10237</a>       
 </td>
+        <td>
+          5.4.0-today
+        </td>
+        <td>
+          carrot2-guava-18.0.jar        </td>
+        <td>not affected</td>
+        <td>Only used with the Carrot2 clustering engine.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2014-0114";>CVE-2014-0114</a>        
</td>
+        <td>
+          4.9.0-7.5.0
+        </td>
+        <td>
+          commons-beanutils-1.8.3.jar        </td>
+        <td>not affected</td>
+        <td>This is only used at compile time and it cannot be used to attack 
Solr. Since it is generally unnecessary, the dependency has been removed as of 
7.5.0. See SOLR-12617.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2019-10086";>CVE-2019-10086</a>       
 </td>
+        <td>
+          8.0.0-8.3.0
+        </td>
+        <td>
+          commons-beanutils-1.9.3.jar        </td>
+        <td>not affected</td>
+        <td>While commons-beanutils was removed in 7.5, it was added back in 
8.0 in error and removed again in 8.3. The vulnerable class was not used in any 
Solr code path. This jar remains a dependency of both Velocity and 
hadoop-common, but Solr does not use it in our implementations.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2012-2098";>CVE-2012-2098</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2018-1324";>CVE-2018-1324</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2018-11771";>CVE-2018-11771</a>       
 </td>
+        <td>
+          4.6.0-today
+        </td>
+        <td>
+          commons-compress (only as part of Ant 1.8.2)        </td>
+        <td>not affected</td>
+        <td>Only used in test framework and at build time.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000632";>CVE-2018-1000632</a>   
     </td>
+        <td>
+          4.6.0-today
+        </td>
+        <td>
+          dom4j-1.6.1.jar        </td>
+        <td>not affected</td>
+        <td>Only used in Solr tests.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2018-10237";>CVE-2018-10237</a>       
 </td>
+        <td>
+          4.6.0-today
+        </td>
+        <td>
+          guava-*.jar        </td>
+        <td>not affected</td>
+        <td>Only used in tests.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2017-15718";>CVE-2017-15718</a>       
 </td>
+        <td>
+          6.6.1-7.6.0
+        </td>
+        <td>
+          hadoop-auth-2.7.4.jar,             hadoop-hdfs-2.7.4.jar (all 
Hadoop)        </td>
+        <td>not affected</td>
+        <td>Does not impact Solr because Solr uses Hadoop as a client 
library.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2017-14952";>CVE-2017-14952</a>       
 </td>
+        <td>
+          6.0.0-7.5.0
+        </td>
+        <td>
+          icu4j-56.1.jar,             icu4j-59.1.jar        </td>
+        <td>not affected</td>
+        <td>Issue applies only to the C++ release of ICU and not ICU4J, which 
is what Lucene uses. ICU4J is at v63.2 as of Lucene/Solr 7.6.0</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2017-15095";>CVE-2017-15095</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2017-17485";>CVE-2017-17485</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2017-7525";>CVE-2017-7525</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2018-5968";>CVE-2018-5968</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2018-7489";>CVE-2018-7489</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2019-12086";>CVE-2019-12086</a>, <a 
href="https://nvd [...]
+        <td>
+          4.7.0-today
+        </td>
+        <td>
+          jackson-databind-*.jar        </td>
+        <td>not affected</td>
+        <td>These CVEs, and most of the known jackson-databind CVEs since 
2017, are all related to problematic 'gadgets' that could be exploited during 
deserialization of untrusted data. The Jackson developers described 4 
conditions that must be met in order for a problematic gadget to be exploited. 
See <a 
href="https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062";>https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-y
 [...]
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2019-10241";>CVE-2019-10241</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2019-10247";>CVE-2019-10247</a>       
 </td>
+        <td>
+          7.7.0-8.2
+        </td>
+        <td>
+          jetty-9.4.14        </td>
+        <td>not affected</td>
+        <td>Solr upgraded to Jetty 9.4.19 for the 8.2 release. Additionally, 
the path to exploit these vulnerabilities was fixed in 8.1 and 7.7.2. Earlier 
versions can manually patch their configurations as described in 
SOLR-13409.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2020-27218";>CVE-2020-27218</a>       
 </td>
+        <td>
+          7.3.0-8.8.0
+        </td>
+        <td>
+          jetty-9.4.0 to 9.4.34        </td>
+        <td>not affected</td>
+        <td>Only exploitable through use of Jetty's GzipHandler, which is only 
implemented in Embedded Solr Server.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2020-27223";>CVE-2020-27223</a>       
 </td>
+        <td>
+          7.3.0-present
+        </td>
+        <td>
+          jetty-9.4.6 to 9.4.36        </td>
+        <td>not affected</td>
+        <td>Only exploitable if Solr's webapp directory is deployed as a 
symlink, which is not Solr's default.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2021-33813";>CVE-2021-33813</a>       
 </td>
+        <td>
+          to present
+        </td>
+        <td>
+          jdom-*.jar        </td>
+        <td>not affected</td>
+        <td>JDOM is only used in Solr Cell, which should not be used in 
production which makes the vulnerability unexploitable. It is a dependency of 
Apache Tika, which has analyzed the issue and determined the vulnerability is 
limited to two libraries not commonly used in search applications, see 
TIKA-3488 for details. Since Tika should be used outside of Solr, use a version 
of Tika which updates the affected libraries if concerned about exposure to 
this issue.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2018-1000056";>CVE-2018-1000056</a>   
     </td>
+        <td>
+          4.6.0-7.6.0
+        </td>
+        <td>
+          junit-4.10.jar        </td>
+        <td>not affected</td>
+        <td>JUnit only used in tests; CVE only refers to a Jenkins plugin not 
used by Solr.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2014-7940";>CVE-2014-7940</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2016-6293";>CVE-2016-6293</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2016-7415";>CVE-2016-7415</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2017-14952";>CVE-2017-14952</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2017-17484";>CVE-2017-17484</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2017-7867";>CVE-2017-7867</a>, <a 
href="https://nvd.n [...]
+        <td>
+          7.3.1
+        </td>
+        <td>
+          lucene-analyzers-icu-7.3.1.jar        </td>
+        <td>not affected</td>
+        <td>All of these issues apply to the C++ release of ICU and not ICU4J, 
which is what Lucene uses.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2019-16869";>CVE-2019-16869</a>       
 </td>
+        <td>
+          8.2-8.3
+        </td>
+        <td>
+          netty-all-4.1.29.Final.jar        </td>
+        <td>not affected</td>
+        <td>This is not included in Solr but is a dependency of ZooKeeper 
3.5.5. The version was upgraded in ZooKeeper 3.5.6, included with Solr 8.3. The 
specific classes mentioned in the CVE are not used in Solr (nor in ZooKeeper as 
far as the Solr community can determine).</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2017-14868";>CVE-2017-14868</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2017-14949";>CVE-2017-14949</a>       
 </td>
+        <td>
+          5.2.0-today
+        </td>
+        <td>
+          org.restlet-2.3.0.jar        </td>
+        <td>not affected</td>
+        <td>Solr should not be exposed outside a firewall where bad actors can 
send HTTP requests. These two CVEs specifically involve classes 
(SimpleXMLProvider and XmlRepresentation, respectively) that Solr does not use 
in any code path.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2015-5237";>CVE-2015-5237</a>        
</td>
+        <td>
+          6.5.0-today
+        </td>
+        <td>
+          protobuf-java-3.1.0.jar        </td>
+        <td>not affected</td>
+        <td>Dependency for Hadoop and Calcite. ??</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2018-1471";>CVE-2018-1471</a>        
</td>
+        <td>
+          5.4.0-7.7.2, 8.0-8.3
+        </td>
+        <td>
+          simple-xml-2.7.1.jar        </td>
+        <td>not affected</td>
+        <td>Dependency of Carrot2 and used during compilation, not at runtime 
(see SOLR-769. This .jar was replaced in Solr 8.3 and backported to 7.7.3 (see 
SOLR-13779).</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2018-8088";>CVE-2018-8088</a>        
</td>
+        <td>
+          4.x-today
+        </td>
+        <td>
+          slf4j-api-1.7.24.jar,             jcl-over-slf4j-1.7.24.jar,         
    jul-to-slf4j-1.7.24.jar        </td>
+        <td>not affected</td>
+        <td>The reported CVE impacts org.slf4j.ext.EventData, which is not 
used in Solr.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2018-1335";>CVE-2018-1335</a>        
</td>
+        <td>
+          7.3.1-7.5.0
+        </td>
+        <td>
+          tika-core.1.17.jar        </td>
+        <td>not affected</td>
+        <td>Solr does not run tika-server, so this is not a problem.</td>
+      </tr>
+      <tr>
+        <td>
+          <a href="https://nvd.nist.gov/vuln/detail/CVE-";>CVE-</a>        </td>
+        <td>
+          7.3.1-today
+        </td>
+        <td>
+          tika-core.*.jar        </td>
+        <td>not affected</td>
+        <td>All Tika issues that could be Solr vulnerabilities would only be 
exploitable if untrusted files are indexed with SolrCell. This is not 
recommended in production systems, so Solr does not consider these valid CVEs 
for Solr.</td>
+      </tr>
+      <tr>
+        <td>
+          <a href="https://nvd.nist.gov/vuln/detail/CVE-";>CVE-</a>        </td>
+        <td>
+          6.6.2-today
+        </td>
+        <td>
+          velocity-tools-2.0.jar        </td>
+        <td>not affected</td>
+        <td>Solr does not ship a Struts jar. This is a transitive POM listing 
and not included with Solr (see comment in SOLR-2849).</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2016-6809";>CVE-2016-6809</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2018-1335";>CVE-2018-1335</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2018-1338";>CVE-2018-1338</a>, <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2018-1339";>CVE-2018-1339</a>        
</td>
+        <td>
+          5.5.5, 6.2.0-today
+        </td>
+        <td>
+          vorbis-java-tika-0.8.jar        </td>
+        <td>not affected</td>
+        <td>See <a 
href="https://github.com/Gagravarr/VorbisJava/issues/30";>https://github.com/Gagravarr/VorbisJava/issues/30</a>;
 reported CVEs are not related to OggVorbis at all.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2012-0881";>CVE-2012-0881</a>        
</td>
+        <td>
+          ~2.9-today
+        </td>
+        <td>
+          xercesImpl-2.9.1.jar        </td>
+        <td>not affected</td>
+        <td>Only used in Lucene Benchmarks and Solr tests.</td>
+      </tr>
+      <tr>
+        <td>
+          <a 
href="https://nvd.nist.gov/vuln/detail/CVE-2023-51074";>CVE-2023-51074</a>, 
GHSA-pfh2-hfmq-phg5        </td>
+        <td>
+          all
+        </td>
+        <td>
+          json-path-2.8.0.jar        </td>
+        <td>not affected</td>
+        <td>The only places we use json-path is for querying (via Calcite) and 
for transforming/indexing custom JSON. Since the advisory describes a problem 
that is limited to the current thread, and users that are allowed to 
query/transform/index are already trusted to cause load to some extent, this 
advisory does not appear to have impact on the way json-path is used in 
Solr.</td>
+      </tr>
+    <!-- END STATIC TABLE SOLR-17339 -->
     </table>
 </div>
   </div>

Reply via email to