SB2019081214 - Remote code execution in Apache Solr DataImportHandler



SB2019081214 - Remote code execution in Apache Solr DataImportHandler

Published: August 12, 2019

Security Bulletin ID SB2019081214
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Exposed dangerous method or function (CVE-ID: CVE-2019-0193)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to DataImportHandler module in Apache Solr has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. A remote attacker can send a specially crafted reuqest to the affected application and execute arbitrary code on the target system.



Remediation

Install update from vendor's website.