CVE-2019-0192

EUVD-2019-0397
In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
9.8 CRITICAL
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
Affected Products (NVD)
VendorProductVersion
apachesolr
5.0.0 ≤
𝑥
≤ 5.5.5
apachesolr
6.0.0 ≤
𝑥
≤ 6.6.5
netappstorage_automation_store
-
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
lucene-solr
bookworm
3.6.2+dfsg-26
fixed
bullseye
3.6.2+dfsg-24
fixed
sid
3.6.2+dfsg-26
fixed
trixie
3.6.2+dfsg-26
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
lucene-solr
bionic
needs-triage
cosmic
ignored
disco
ignored
eoan
ignored
focal
needs-triage
groovy
ignored
hirsute
ignored
impish
ignored
jammy
needs-triage
kinetic
ignored
lunar
ignored
mantic
ignored
noble
needs-triage
trusty
needs-triage
xenial
needs-triage
References