SB2019112102 - Remote code execution in Apache Solr
Published: November 21, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper Authentication (CVE-ID: CVE-2019-12409)
The vulnerability allows a remote attacker to bypass authentication process.
The vulnerability exists due to insecure default configuration in solr.in.sh of Apache Solr. The "ENABLE_REMOTE_JMX_OPTS" is set to "true" by default, which allows remote JMX client applications. A remote non-authenticated attacker can bypass authentication process and gain execute arbitrary code on the system.
Remediation
Install update from vendor's website.
References
- https://lists.apache.org/thread.html/6640c7e370fce2b74e466a605a46244ccc40666ad9e3064a4e04a85d@%3Csolr-user.lucene.apache.org%3E
- https://www.tenable.com/blog/cve-2019-12409-default-configuration-in-apache-solr-could-lead-to-remote-code-execution
- https://github.com/jas502n/CVE-2019-12409/
- https://issues.apache.org/jira/browse/SOLR-13647