Those CVEs all appear to relate to old Jackson versions. Solr 8.11.2
includes jackson 2.13.3 which is not affected by those CVEs.
So I'm not sure why a scanner would even flag those CVEs, unless they're
transitively referenced by other dependencies.

On Tue, 22 Aug 2023 at 13:02, Mark Bennett <mbenn...@ideaeng.com> wrote:

> Hi Guys,
>
> One of the cool things Lucidworks did was to publish AND REPEATEDLY UPDATE
> all the CVE stuff.  In addition to supporting their own Fusion product,
> Lucid also does quite a bit of Solr work and communications.
>
> If you go on the public support site (no login needed), you can just search
> for CVE info:
>
> https://support.lucidworks.com/hc/en-us/search?utf8=✓&query=cve
>
> They've got 4 or 5 notes..  If you managed to read them all and make notes,
> you'll have a very good picture of the situation.
>
> ALSO, just because a CVE issue exists, often there must also be very
> specific configuration or use pattern to trigger the breach.  BUT, if
> you're not using those particular features, the specific CVE risk may not
> even be feasible in your locked down setup.
>
> Lucid really took this seriously.
>
> I hope some of that helps.
>
>
> --
> Mark Bennett / mbenn...@ideaeng.com / Cell: 408-829-6513
>
>
> On Tue, Aug 22, 2023 at 5:20 AM Jan Høydahl <jan....@cominvent.com> wrote:
>
> > Hi,
> >
> > It would be helpful if you instead of copy/pasting 10 CVE numbers, could
> > break it up and list one by one with its title and summary, and why you
> > have reason to worry that it is a problem for Solr.
> >
> > Then our team can consider each one you believe to be problematic, and
> > decide whether we are vulnerable or not, and perhaps update the list at
> >
> https://solr.apache.org/security.html#cve-reports-for-apache-solr-dependencies
> > with the findings. We also accept Pull Requests for that page at
> > https://github.com/apache/solr-site
> >
> > Jan
> >
> > > 22. aug. 2023 kl. 13:03 skrev Tim Pfeifer (ext) <
> tim.pfeifer....@devk.de
> > .INVALID>:
> > >
> > > Dear Apache Solr Community,
> > >
> > > We are currently in the process of migrating to AWS Cloud, and as part
> > of this transition, we scanned our existing Apache Solr 8.11.2 with
> > AquaSec. Several critical security vulnerabilities have emerged from this
> > scan.
> > >
> > > While many of the identified CVEs are already listed on
> > https://solr.apache.org/security.html and labeled as "not affected",
> > there are some for which we couldn't find any information. We would like
> to
> > know if Apache Solr is affected by the following CVEs:
> > >
> > >  *       CVE-2018-11307
> > >  *       CVE-2018-14718
> > >  *       CVE-2019-14892
> > >  *       CVE-2019-16943
> > >  *       CVE-2019-17267
> > >  *       CVE-2019-17531
> > >  *       CVE-2019-20330
> > >  *       CVE-2020-8840
> > >  *       CVE-2020-9547
> > >  *       CVE-2020-9548
> > >
> > > This information is crucial for us to ensure that our deployment is
> > secure and approved by our security department. Any information or advice
> > you can provide regarding the aforementioned CVEs would be greatly
> > appreciated.
> > >
> > > In conclusion, I thank you in advance for your time and support. Please
> > let me know if you need any additional information or if I should clarify
> > my request further. I will patiently await your response and am open to
> any
> > feedback or suggestions.
> > >
> > > Warm regards,
> > > Tim
> >
> >
>

Reply via email to