Thanks! First, make sure the user supplied data is url-encoded before sent to Solr (SolrJ does it automatically, but you need to do it manually when you construct an http request to Solr by yourself). It prevents injection of addiction parameters using ampersands (‘&’)
Hey @artsploit, this is really cool research :)
Do you have any mitigation advice for this? Is stripping curly brackets and ampersands sufficient or are there other control characters?https://twitter.com/artsploit/status/1160363531444748288 …
-
-
-
Secondly, yes, it’s better to remove curly brackets from the user controlled data to avoid local parameters injection. Although the impact of this attack is pretty limited as long as CVE-2017-12629 is patched.
- Još 1 odgovor
Novi razgovor -
-
-
I saw the talk and and wondered the same thing
@artsploit is there any best-practice mitigation out there?Hvala. Twitter će to iskoristiti za poboljšanje vaše vremenske crte. PoništiPoništi
-
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.