I like the idea of using our Wiki more as you describe.    Not so much
*new* news entries because I think search-ability of these CVEs is fine to
an existing entry.

~ David Smiley
Apache Lucene/Solr Search Developer
http://www.linkedin.com/in/davidwsmiley


On Sat, Dec 18, 2021 at 4:39 PM Gus Heck <gus.h...@gmail.com> wrote:

> Thinking about it some more, maybe the problem with my suggestion is
> the table on that page is organized by the library version and, if
> unmitigated, the version of the library is still a problem. Maybe another
> way to be clearer about it and avoid rewriting things that people have
> already read would be to add independent entries to the security news page
> for the newer CVE's
>
> On Sat, Dec 18, 2021 at 12:20 PM Gus Heck <gus.h...@gmail.com> wrote:
>
>> I think perhaps in the shock of such a deep and surprising vulnerability
>> with such high visibility, we've begun to break with how we normally handle
>> CVE's that don't apply to our usage of the library. Previously, they just
>> got added to the list of known false positives
>> <https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity#SolrSecurity-SolrandVulnerabilityScanningTools>.
>> Normally we wouldn't even mention them on the security news page, but
>> because of the high visibility we should simply have a line mentioning that
>> these two CVE's are on our false positives page and explain details there.
>> The wiki would provide revision history automatically.
>>
>> On Sat, Dec 18, 2021 at 11:25 AM Jan Høydahl <jan....@cominvent.com>
>> wrote:
>>
>>> We make edits to the log4j advisory almost daily, see
>>> https://github.com/apache/solr-site/commits/e10a6a9fe0eed8dcba3ad1a076c8208e014e76ff/content/solr/security/2021-12-10-cve-2021-44228.md
>>> I wonder if we should include a "Revision history" paragraph in the
>>> advisory for transparency?
>>>
>>> Jan
>>>
>>> 15. des. 2021 kl. 19:09 skrev Uwe Schindler <u...@thetaphi.de>:
>>>
>>> Hi all, I prepared a PR about the followup CVE-2021-45046:
>>> https://github.com/apache/solr-site/pull/59
>>>
>>> Please verify and make suggestion. I will merge this into
>>> main/production later.
>>>
>>> Uwe
>>>
>>> -----
>>> Uwe Schindler
>>> Achterdiek 19, D-28357 Bremen
>>> https://www.thetaphi.de
>>> eMail: u...@thetaphi.de
>>>
>>> *From:* Uwe Schindler <u...@thetaphi.de>
>>> *Sent:* Wednesday, December 15, 2021 3:31 PM
>>> *To:* 'dev@lucene.apache.org' <dev@lucene.apache.org>
>>> *Subject:* RE: Log4j < 2.15.0 may still be vulnerable even if
>>> -Dlog4j2.formatMsgNoLookups=true is set
>>>
>>> We should add this to the webpage. Another one asked on the security
>>> mailing list.
>>>
>>> Uwe
>>>
>>> -----
>>> Uwe Schindler
>>> Achterdiek 19, D-28357 Bremen
>>> https://www.thetaphi.de
>>> eMail: u...@thetaphi.de
>>>
>>> *From:* Gus Heck <gus.h...@gmail.com>
>>> *Sent:* Wednesday, December 15, 2021 12:39 AM
>>> *To:* dev <dev@lucene.apache.org>
>>> *Subject:* Re: Log4j < 2.15.0 may still be vulnerable even if
>>> -Dlog4j2.formatMsgNoLookups=true is set
>>>
>>> Perhaps we could tweak it to say that the system property fix is
>>> sufficient *for Solr* (i.e. not imply that it is a valid work around for
>>> all cases)
>>>
>>> On Tue, Dec 14, 2021 at 6:20 PM Uwe Schindler <u...@thetaphi.de> wrote:
>>>
>>> The other attack vectors are also not possible with Solr:
>>>
>>> - Logger.printf("%s", userInput) is not used
>>> - custom message factory is not used
>>>
>>> Uwe
>>> Am 14. Dezember 2021 22:59:26 UTC schrieb Uwe Schindler <u...@thetaphi.de
>>> >:
>>>
>>> It is still a valid mitigation.
>>>
>>> Mike Drobban I explained it. MDC is the other attack vector and that's
>>> not an issue with Solr.
>>>
>>> Please accept this, just because the documentation of log4j changes,
>>> there's no additional risk. We may update the mitigation to mention that in
>>> Solr's case the system property is fine.
>>>
>>> Uwe
>>> Am 14. Dezember 2021 22:52:29 UTC schrieb solr <fred...@rodland.no>:
>>>
>>> Ok.
>>>
>>> But FTR - apache/log4j has discredited just setting the system property as 
>>> a mitigation measure, so I still think the SOLR security-page should be 
>>> changed to not list this as a valid mitigation:
>>>
>>> https://logging.apache.org/log4j/2.x/security.html
>>> "Older (discredited) mitigation measures
>>>
>>> This page previously mentioned other mitigation measures, but we discovered 
>>> that these measures only limit exposure while leaving some attack vectors 
>>> open.
>>>
>>> Other insufficient mitigation measures are: setting system property 
>>> log4j2.formatMsgNoLookups or environment variable 
>>> LOG4J_FORMAT_MSG_NO_LOOKUPS to true for releases >= 2.10, or modifying the 
>>> logging configuration to disable message lookups with %m{nolookups}, 
>>> %msg{nolookups} or %message{nolookups} for releases >= 2.7 and <= 2.14.1.
>>> “
>>>
>>> Regards,
>>>
>>>
>>> Fredrik
>>>
>>>
>>> --
>>> Fredrik Rødland               Cell:    +47 99 21 98 17
>>> Maisen Pedersens vei 1        Twitter: @fredrikr
>>> NO-1363 Høvik, NORWAY         flickr:  http://www.flickr.com/fmmr/
>>> http://rodland.no             about.me http://about.me/fmr
>>>
>>> On 14 Dec 2021, at 23:44, Mike Drob <md...@mdrob.com> wrote:
>>>
>>> The MDC Patterns used by solr are for the collection, shard, replica, core 
>>> and node names, and a potential trace id. All of those are restricted to 
>>> alphanumeric, no special characters like $ or { needed for the injection. 
>>> And trying to access a collection that didn’t exist Returns 404 without 
>>> logging.
>>>
>>> Upgrading is always going to be more complete, but I think we’re still ok 
>>> for now, at least until the next iteration of this attack surfaces.
>>>
>>>
>>>
>>> On Tue, Dec 14, 2021 at 3:37 PM solr <fred...@rodland.no> wrote:
>>> Only setting -Dlog4j2.formatMsgNoLookups=true might not be enough to 
>>> mitigate the log4j vulnerability.
>>>
>>> See https://github.com/kmindi/log4shell-vulnerable-app
>>> “So even with LOG4J_FORMAT_MSG_NO_LOOKUPS true version 2.14.1 of log4j is 
>>> vulnerable when using ThreadContextMap in PatternLayout.”
>>>
>>> ThreadContext.put(key, value) is used under the hood by MDC.  I’m not sure 
>>> wether any user-input is actually stored in MDC in SOLR.
>>>
>>>
>>> Probably this should be updated: 
>>> https://solr.apache.org/security.html#apache-solr-affected-by-apache-log4j-cve-2021-44228
>>>
>>> And maybe consider releasing patch releases for other versions than 8.11 as 
>>> well which includes log4j 2.16.0?
>>>
>>>
>>>
>>> Regards,
>>>
>>>
>>> Fredrik
>>>
>>>
>>> --
>>> Fredrik Rødland               Cell:    +47 99 21 98 17
>>> Maisen Pedersens vei 1        Twitter: @fredrikr
>>> NO-1363 Høvik, NORWAY         flickr:  http://www.flickr.com/fmmr/
>>> http://rodland.no             about.me http://about.me/fmr
>>>
>>> ------------------------------
>>>
>>> To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
>>> For additional commands, e-mail: dev-h...@lucene.apache.org
>>>
>>> ------------------------------
>>>
>>> To unsubscribe, e-mail: dev-unsubscr...@lucene.apache.org
>>> For additional commands, e-mail: dev-h...@lucene.apache.org
>>>
>>> --
>>> Uwe Schindler
>>> Achterdiek 19, 28357 Bremen
>>> https://www.thetaphi.de
>>>
>>> --
>>> Uwe Schindler
>>> Achterdiek 19, 28357 Bremen
>>> https://www.thetaphi.de
>>>
>>>
>>>
>>> --
>>> http://www.needhamsoftware.com (work)
>>> http://www.the111shift.com (play)
>>>
>>>
>>>
>>
>> --
>> http://www.needhamsoftware.com (work)
>> http://www.the111shift.com (play)
>>
>
>
> --
> http://www.needhamsoftware.com (work)
> http://www.the111shift.com (play)
>

Reply via email to