HIGH
In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.
http://www.securityfocus.com/bid/107318
https://access.redhat.com/errata/RHSA-2019:2413
https://lists.apache.org/thread.html/[email protected]%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccommits.nifi.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Cdev.lucene.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccommits.submarine.apache.org%3E
https://lists.apache.org/thread.html/[email protected]%3Ccommits.nifi.apache.org%3E
https://security.netapp.com/advisory/ntap-20190327-0003/
https://www.oracle.com/security-alerts/cpuoct2020.html
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
Source: MITRE
Published: 2019-03-07
Updated: 2020-12-09
Type: CWE-502
Base Score: 7.5
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P
Impact Score: 6.4
Exploitability Score: 10
Severity: HIGH
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 3.9
Severity: CRITICAL