mirror of https://github.com/apache/lucene.git
SOLR-8262: Comment out /stream handler from sample solrconfig.xml's for security reasons
git-svn-id: https://svn.apache.org/repos/asf/lucene/dev/trunk@1713530 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
parent
be10d9e501
commit
b4b7fce0fe
|
@ -354,6 +354,9 @@ Bug Fixes
|
|||
* SOLR-8254: HttpSolrCore.getCoreByCollection() can throw NPE (Alan Woodward,
|
||||
Mark Miller)
|
||||
|
||||
* SOLR-8262: Comment out /stream handler from sample solrconfig.xml's for security reasons
|
||||
(Joel Bernstein)
|
||||
|
||||
Optimizations
|
||||
----------------------
|
||||
|
||||
|
|
|
@ -871,8 +871,18 @@
|
|||
|
||||
|
||||
<!--
|
||||
Distributed Stream processing.
|
||||
-->
|
||||
|
||||
Uncomment for distributed Stream processing (also required by the /sql handler in map_reduce mode).
|
||||
|
||||
SECURTIY WARNING: This feature uses Java Serialization for RPC (Remote Procedure Calls) to send executable
|
||||
Java Objects to Worker nodes.
|
||||
|
||||
Solr also currently has apache commons-collections in it's classpath.
|
||||
|
||||
This makes Solr vulnerable to this security exploit:
|
||||
|
||||
https://issues.apache.org/jira/browse/COLLECTIONS-580.
|
||||
|
||||
|
||||
<requestHandler name="/stream" class="solr.StreamHandler">
|
||||
<lst name="invariants">
|
||||
|
@ -881,6 +891,7 @@
|
|||
</lst>
|
||||
</requestHandler>
|
||||
|
||||
-->
|
||||
|
||||
<requestHandler name="/sql" class="solr.SQLHandler">
|
||||
<lst name="invariants">
|
||||
|
|
|
@ -899,8 +899,18 @@
|
|||
|
||||
|
||||
<!--
|
||||
Distributed Stream processing.
|
||||
-->
|
||||
|
||||
Uncomment for distributed Stream processing (also required by the /sql handler in map_reduce mode).
|
||||
|
||||
SECURTIY WARNING: This feature uses Java Serialization for RPC (Remote Procedure Calls) to send executable
|
||||
Java Objects to Worker nodes.
|
||||
|
||||
Solr also currently has apache commons-collections in it's classpath.
|
||||
|
||||
This makes Solr vulnerable to this security exploit:
|
||||
|
||||
https://issues.apache.org/jira/browse/COLLECTIONS-580.
|
||||
|
||||
|
||||
<requestHandler name="/stream" class="solr.StreamHandler">
|
||||
<lst name="invariants">
|
||||
|
@ -909,6 +919,8 @@
|
|||
</lst>
|
||||
</requestHandler>
|
||||
|
||||
-->
|
||||
|
||||
|
||||
<requestHandler name="/sql" class="solr.SQLHandler">
|
||||
<lst name="invariants">
|
||||
|
|
Loading…
Reference in New Issue