Hi Billy,

Thanks for bringing this up. The CVE you link is rejected (
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-40153). However
reading through the report here:
https://github.com/x-stream/xstream/issues/304 it seems that this was part
of a series of low quality auto generated CVE reports and 4/6 of them were
rejected, but annoyingly NVD only reflects the rejected status for 3 out of
4, having missed it for the one you linked. In any case,
https://nvd.nist.gov/vuln/detail/CVE-2022-40152 did eventually stick to
woodstox after initially being reported against x-stream and can be fixed
by an upgrade to woodstox 6.4. Main branch is on 6.3.1 presently and Solr
will receive this upgrade to 6.4 as part of the Caffeine Cache upgrade, so
you can follow https://issues.apache.org/jira/browse/SOLR-16562 (I have
added a comment so, hopefully it at least shows up in searches for the
correct CVE soon).

Sorry the response took so long, For my part I missed the first mail you
sent. It's not my job any more than anyone else on the PMC to respond, but
I do appreciate the way you have been following our requested process on
the security page which I helped revise. Once I saw your second mail, I
initiated a small private list discussion to try to ensure a coherent
response since it didn't seem to have been addressed previously. It doesn't
look like there is much risk from this one since it's at most a DOS and
would only be encountered by users that are using text tagging
functionality since that is the only place we use this library directly. I
also see it as a transitive dependency in some of the s3 related code, but
is not directly used by us in that module. While there is processing of
external data in this path, this would generally be indexing related, which
makes a DOS a bit difficult to achieve. This is based on initial quick
look/discussion, but there has been no serious attempt to
find/verify/exclude an exploit since it's getting fixed soon as part of
other work, so YMMV.

-Gus

On Tue, Nov 29, 2022 at 8:30 AM Billy Kidwell <bkidw...@opentext.com.invalid>
wrote:

> https://nvd.nist.gov/vuln/detail/CVE-2022-40153
>
> Our container scan found a potential security vulnerability in Solr 9.0.0
> and 9.1.0 for woodstox-core.
>
> I checked the security page, the official list of non-exploitable
> vulnerabilities and the user mailing list.  I also checked jira.  There are
> a number of tickets concerning woodstox, but they seem to be prior issues.
>
> For 9.1.0, the package version seems to be 6.2.8
>
> /solr/server/solr-webapp/webapp/WEB-INF/lib/woodstox-core-6.2.8.jar
>
> This vulnerability is addressed in 6.4.0.
>
> Does anyone know if this vulnerability is exploitable in Solr?
> If so, under what circumstances?
>
> Thanks,
>
> Bill
>


-- 
http://www.needhamsoftware.com (work)
http://www.the111shift.com (play)

Reply via email to