Skip to content

Commit

Permalink
First draft presenting dependency vulnerability info
Browse files Browse the repository at this point in the history
  • Loading branch information
raboof committed Dec 16, 2022
1 parent 8a6de1a commit 84d44f4
Show file tree
Hide file tree
Showing 9 changed files with 2,342 additions and 7 deletions.
35 changes: 29 additions & 6 deletions content/pages/security.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,20 +10,21 @@ Every CVE that is detected by a software scanner is by definition already public

To find a path forward in addressing a detected CVE we suggest the following process for fastest results:

1. Check further down this page to see if the CVE is listed as exploitable in Solr.
2. Check the [officially published non-exploitable vulnerabilities](https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity#SolrSecurity-SolrandVulnerabilityScanningTools) list to see if the CVE is listed as not exploitable in Solr.
1. Check [further down this page](#recent-cve-reports-for-apache-solr) to see if the CVE is listed as exploitable in Solr.
2. Check the [officially published non-exploitable vulnerabilities](#cve-reports-for-apache-solr-dependencies) list to see if the CVE is listed as not exploitable in Solr.
3. Search through the [Solr users mailing list archive](https://lists.apache.org/list.html?users@solr.apache.org) to see if anyone else has brought up this dependency CVE.
4. If no one has, then please do [subscribe to the users mailing list](https://solr.apache.org/community.html#mailing-lists-chat) and then send an email asking about the CVE.

#### Dos and Don'ts
* Please DO discuss the possible need for library upgrades on the user list.
* Please DO discuss the possible need for library upgrades on the user list.
* Please DO search Jira for the CVE number to see if we are addressing it already.
* Please DO create Jira issues and associated pull requests to propose and discuss upgrades of *a single specific* dependency.
* Please DO NOT attach a scan report, or paste output of a scan into Jira (just link the CVE instead)
* Please DO NOT email the security email below with a scan report it will be ignored.
* Please DO look into automating some of this with [VEX](#vex) and share your experience.

#### Use of Jira
Jira is for discussing specific development modifications. Any Jira that contains only scan report output, or references multiple dependencies at the same time is likely to be ignored/closed. The large number of folks sending us reports of things that are already known is a serious drag on our (volunteer) time so **please search Jira** before opening a new issue.
Jira is for discussing specific development modifications. Any Jira that contains only scan report output, or references multiple dependencies at the same time is likely to be ignored/closed. The large number of folks sending us reports of things that are already known is a serious drag on our (volunteer) time so **please search Jira** before opening a new issue.

### New Exploits <span style="color:blue">You</span> Discover in Solr

Expand All @@ -37,8 +38,30 @@ Before reporting a new exploit ensure that you have tested it against an instanc
1. **Authentication** - Exploits demonstrated without login waste our time because Solr is not meant to run such that the entire world has access to all of its APIs. Running without forcing users to log in is no more valid than running linux with a widely known default root password, or a database with a root account that has no password.
2. **Authorization** - It is not an exploit unless the authenticated user was configured with a role that should have prohibited the action, or the action should never be allowed for any user regardless of role. Your report should say why you think this action is not acceptable for the role(s) you tested it with.

#### VEX
Since the process of checking whether CVEs in dependencies of Solr affect your
Solr deployment is tedious and error-prone, we are experimenting with sharing
information about advisories that are known (not) to affect Solr in a
machine-readable way.

File formats to share this information are called 'VEX' formats. A number of
such formats are under active development, such as based on
[CycloneDX](https://cyclonedx.org/capabilities/vex/) and
[CSAF](https://github.com/oasis-tcs/csaf/blob/master/csaf_2.0/prose/csaf-v2-editor-draft.md#45-profile-5-vex).

We are currently providing vulnerability information in a CycloneDX JSON-based
format [here](/solr.vex.json). We are very curious to hear about your experience,
and to find out what is still missing to reduce the signal/noise ratio and make
these tools more effective. We invite you to join the discussion at the
[security-discuss](mailto:security-discuss@community.apache.org)
[mailinglist](https://www.apache.org/foundation/mailinglists.html) or,
if you prefer to collaborate in private, contact
[security@apache.org](mailto:security@apache.org). It will likely be interesting
to know what security scanning/reporting tool you are using, exactly on which
artifacts, and if/how its vendor appears to support VEX. We'd be happy to work
with you to see if we can provide this information in other variations or formats.


### More information
You will find more security related information on our Wiki: [https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity](https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity)

# Recent CVE reports for Apache Solr
Below is a list of already announced CVE vulnerabilities. These are also available as an [ATOM feed](/feeds/solr/security.atom.xml):
3 changes: 2 additions & 1 deletion pelicanconf.py
Original file line number Diff line number Diff line change
Expand Up @@ -96,7 +96,8 @@
'extract_toc',
'jinja2content',
'regex_replace',
'age_days_lt'
'age_days_lt',
'vex'
# 'md_inline_extension',
]

Expand Down
1 change: 1 addition & 0 deletions plugins/vex/__init__.py
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
from .vex import *
Loading

0 comments on commit 84d44f4

Please sign in to comment.