[ 
https://issues.apache.org/jira/browse/SOLR-1523?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=12779369#action_12779369
 ] 

Noble Paul commented on SOLR-1523:
----------------------------------

bq....but i'm opposed to this idea as well. Any feature that purports to make 
solr more "secure" just leaves us more open to risk 

I cannot completely agree with this. There are different levels of security. 
This one is not necessarily a security thing. This is just avoiding someone 
inadvertently invoking some request handler and making a write operation. If by 
configuration we can disallow GET for certain RequestHandlers I guess it should 
be fine. This can make Solr server move from the "extremely vulnerable" to 
"moderately vulnerable". For some users that should be just fine

> Destructive Solr operations accept HTTP GET requests 
> -----------------------------------------------------
>
>                 Key: SOLR-1523
>                 URL: https://issues.apache.org/jira/browse/SOLR-1523
>             Project: Solr
>          Issue Type: Improvement
>    Affects Versions: 1.4
>            Reporter: Lance Norskog
>
> GET v.s. POST/PUT/DELETE
> The multicore implementation allows HTTP GET requests to perform system 
> administration commands. This means that an URL which alters the system can 
> be bookmarked/e-mailed/etc. This is dangerous in a production system.
> A clean implementation should give every request handler the ability to 
> accept some HTTP verbs and reject others. It could be just a boolean for 
> whether it accepts a GET, or the interface might actually have a list of 
> verbs it accepts. 

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to