First published: Mon Nov 18 2019(Updated: )
The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Solr | =8.1.1 | |
Apache Solr | =8.2.0 | |
Linux Linux kernel |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12409 is a critical vulnerability in Apache Solr 8.1.1 and 8.2.0 releases that allows for remote code execution due to an insecure setting in the solr.in.sh configuration file.
CVE-2019-12409 allows an attacker to execute arbitrary code remotely on a vulnerable Apache Solr server.
CVE-2019-12409 has a severity rating of 9.8 (Critical).
Apache Solr versions 8.1.1 and 8.2.0 are affected by CVE-2019-12409.
To fix CVE-2019-12409, update Apache Solr to a version that is not affected by this vulnerability and modify the solr.in.sh configuration file to remove the insecure setting for ENABLE_REMOTE_JMX_OPTS.