First published: Thu Mar 07 2019(Updated: )
A flaw was found in the Apache Solr's Config API, where it would permit the configuration of the JMX server via an HTTP POST request. An attacker could use this flaw to direct traffic to a malicious RMI server, and then trigger remote code execution or conduct further attacks.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Solr | >=5.0.0<=5.5.5 | |
Apache Solr | >=6.0.0<=6.6.5 | |
Netapp Storage Automation Store |
* Upgrade to 6.6.6 or later * Disable the ConifgAPI if not in use (`disable.configEdit=true`) * Use other external means to ensure only trusted traffic is allowed (block POST requests to the config API from external sources)
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-0192.
The severity of CVE-2019-0192 is critical with a score of 9.8.
Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, as well as Netapp Storage Automation Store, are affected by CVE-2019-0192.
CVE-2019-0192 allows remote code execution by exploiting Solr's unsafe deserialization through a malicious RMI server.
You can find more information about CVE-2019-0192 in the provided references: [1], [2], [3].