Limit remote streaming to update handlers
-----------------------------------------

                 Key: SOLR-2854
                 URL: https://issues.apache.org/jira/browse/SOLR-2854
             Project: Solr
          Issue Type: Improvement
            Reporter: David Smiley


I think the remote streaming feature should be limited to update request 
processors. I'm not sure if there is even any use of using it on a /select, but 
even if there is, it's an unintended security risk.  Observe this URL that is 
roughly the equivalent of an SQL injection attack:

http://localhost:8983/solr/select?q=*:*&indent=on&wt=ruby&rows=2&stream.url=http%3A%2F%2Flocalhost%3A8983%2Fsolr%2Fupdate%3Fcommit%3Dtruetream.body%3D%3Cdelete%3E%3Cquery%3E*%3A*%3C%2Fquery%3E%3C%2Fdelete%3E

Yep; that's right -- this *search* deletes all the data in your Solr instance! 
If you blocked off access to /update* based on IP then that isn't good enough.

--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators: 
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira

        

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to