Apache Solr 5.x <= 5.5.5 or 6.x <= 6.6.5 Deserialization Vulnerability (CVE-2019-0192)

critical Nessus Plugin ID 126447

Synopsis

The remote web server contains a Java application that is affected by a remote code execution vulnerability.

Description

The version of Apache Solr running on the remote web server is affected by a remote code execution vulnerability in the Config API due to unsafe deserialization of Java objects. An unauthenticated, remote attacker can exploit this, via an HTTP POST request that points the JMX server to a malicious RMI server. An attacker could then send a crafted serialized Java object to the server, to execute arbitrary code.

Solution

Upgrade to Apache Solr version 7.0 or later, refer to the vendor advisory for relevant patch and configuration settings.

See Also

http://www.nessus.org/u?5f3c5a00

http://www.nessus.org/u?eadaffeb

Plugin Details

Severity: Critical

ID: 126447

File Name: apache_solr_cve-2019-0192.nbin

Version: 1.66

Type: remote

Family: CGI abuses

Published: 7/3/2019

Updated: 3/19/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-0192

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:solr

Required KB Items: installed_sw/Apache Solr

Exploit Ease: No known exploits are available

Patch Publication Date: 3/7/2019

Vulnerability Publication Date: 3/7/2019

Reference Information

CVE: CVE-2019-0192

BID: 107318