CVE-2019-0192

critical
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.

References

http://mail-archives.us.apache.org/mod_mbox/www-announce/201903.mbox/%3CCAECwjAV1buZwg%2BMcV9EAQ19MeAWztPVJYD4zGK8kQdADFYij1w%40mail.gmail.com%3E

http://www.securityfocus.com/bid/107318

https://access.redhat.com/errata/RHSA-2019:2413

https://lists.apache.org/thread.html/[email protected]%3Cdev.lucene.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.lucene.apache.org%3E

https://lists.apache.org/thread.html/b0ace855f569c6b7a0b03ba68566e53b1a1a519abd536bf38978[email protected]%3Cdev.lucene.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.nifi.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.lucene.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.lucene.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.submarine.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.nifi.apache.org%3E

https://security.netapp.com/advisory/ntap-20190327-0003/

https://www.oracle.com/security-alerts/cpuoct2020.html

https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

Details

Source: MITRE

Published: 2019-03-07

Updated: 2020-12-09

Type: CWE-502

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:* versions from 5.0.0 to 5.5.5 (inclusive)

cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:* versions from 6.0.0 to 6.6.5 (inclusive)

Configuration 2

OR

cpe:2.3:a:netapp:storage_automation_store:-:*:*:*:*:*:*:*

Tenable Plugins

View all (5 total)

IDNameProductFamilySeverity
98921Apache Solr 6.0.0 < 6.6.5 Remote Code ExecutionWeb Application ScanningComponent Vulnerability
critical
98919Apache Solr 5.0.0 < 5.5.5 Remote Code ExecutionWeb Application ScanningComponent Vulnerability
critical
126829Oracle Primavera Unifier Multiple Vulnerabilities (Jul 2019 CPU)NessusCGI abuses
critical
126447Apache Solr 5.x <= 5.5.5 or 6.x <= 6.6.5 Deserialization Vulnerability (CVE-2019-0192)NessusCGI abuses
critical
123417Apache Solr 5.x <= 5.5.5 or 6.x <= 6.6.5 Deserialization VulnerabilityNessusCGI abuses
critical