First published: Thu Aug 01 2019(Updated: )
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Solr | <8.2.0 | |
Apache Solr | <7.7.3 | |
Apache Solr | >=8.1.0<8.1.2 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
maven/org.apache.solr:solr-core | <8.2.0 | 8.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-0193 is a code injection vulnerability in Apache Solr's DataImportHandler.
The vulnerability allows an attacker to inject malicious code through the "dataConfig" parameter of a request to the DataImportHandler.
CVE-2019-0193 has a severity rating of 7.2, which is considered critical.
Apache Solr versions up to 8.2.0 are affected by CVE-2019-0193.
To fix the vulnerability, update Apache Solr to a version that is not affected by CVE-2019-0193.