The applications using the data may write solr data to the dom. (I doubt
they do but they could now or in the future. They have an expectation of
trusting the data back from solr).

As a straight forward attack you are right though. But it is incorrect
behavior? It should not produce bogus fields and values for each record
returned ?

On 26 November 2014 at 15:34, Yonik Seeley <yo...@heliosearch.com> wrote:

> It would have been helpful if you would have pointed out exactly what
> you think the problem is.
> I still don't see an issue, since it doesn't look like any
> encapsulation has been broken.
>
> -Yonik
> http://heliosearch.org - native code faceting, facet functions,
> sub-facets, off-heap data
>
>
> On Wed, Nov 26, 2014 at 9:56 AM, Lee Carroll
> <lee.a.carr...@googlemail.com> wrote:
> > Hi All,
> > In solr 4.7 this query
> > /solr/coreName/select/?q=*:*&fl=%27nasty%20value%27&rows=1&wt=json
> >
> >  returns
> >
> >
> {"responseHeader":{"status":0,"QTime":2},"response":{"numFound":189796,"start":0,"docs":[{"'nasty
> > value'":"nasty value"}]}}
> >
> > This is naughty. Has this been seen before / fixed ?
>

Reply via email to