In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.

Published at
2019-03-07
1046 days ago
Modified
2020-12-09
403 days ago
2019
Year
The year of the turtle

http://www.securityfocus.com/bid/107318

BID:107318

https://security.netapp.com/advisory/ntap-20190327-0003/

CONFIRM:https://security.netapp.com/advisory/ntap-20190327-0003/

https://www.oracle.com/security-alerts/cpuoct2020.html

MISC:https://www.oracle.com/security-alerts/cpuoct2020.html

https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

MISC:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html

https://lists.apache.org/thread.html/b0ace855f569c6b7a0b03ba68566e53b1a1a519abd536bf38978ce4a@%3Cdev.lucene.apache.org%3E

MLIST:[lucene-dev] 20190320 [jira] [Commented] (SOLR-13301) [CVE-2019-0192] Deserialization of untrusted data via jmx.serviceUrl

https://lists.apache.org/thread.html/42c5682f4acd1d03bd963e4f47ae448d7cff66c16b19142773818892@%3Cdev.lucene.apache.org%3E

MLIST:[lucene-dev] 20190320 [jira] [Issue Comment Deleted] (SOLR-13301) [CVE-2019-0192] Deserialization of untrusted data via jmx.serviceUrl

https://lists.apache.org/thread.html/ec9c572fb803b26ba0318777977ee6d6a2fb3a2c50d9b4224e541d5d@%3Cdev.lucene.apache.org%3E

MLIST:[lucene-dev] 20190326 [jira] [Commented] (SOLR-13301) [CVE-2019-0192] Deserialization of untrusted data via jmx.serviceUrl

https://lists.apache.org/thread.html/d0e608c681dfbb16b4da68d99d43fa0ddbd366bb3bcf5bc0d43c56d7@%3Cdev.lucene.apache.org%3E

MLIST:[lucene-dev] 20190326 [jira] [Updated] (SOLR-13301) [CVE-2019-0192] Deserialization of untrusted data via jmx.serviceUrl

https://lists.apache.org/thread.html/53e4744b14fb7f1810405f8ff5531ab0953a23dd09ce8071ce87e00d@%3Cdev.lucene.apache.org%3E

MLIST:[lucene-dev] 20190327 [jira] [Commented] (SOLR-13301) [CVE-2019-0192] Deserialization of untrusted data via jmx.serviceUrl

https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E

MLIST:[nifi-commits] 20191113 svn commit: r1869773 - /nifi/site/trunk/security.html

https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E

MLIST:[nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html

https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E

MLIST:[submarine-commits] 20201209 [GitHub] [submarine] QiAnXinCodeSafe opened a new issue #474: There is a vulnerability in Apache Solr 5.5.4,upgrade recommended

http://mail-archives.us.apache.org/mod_mbox/www-announce/201903.mbox/%3CCAECwjAV1buZwg%2BMcV9EAQ19MeAWztPVJYD4zGK8kQdADFYij1w%40mail.gmail.com%3E

MLIST:[www-announce] 20190307 CVE-2019-0192 Deserialization of untrusted data via jmx.serviceUrl in Apache Solr

https://access.redhat.com/errata/RHSA-2019:2413

REDHAT:RHSA-2019:2413

Vulnerability RAW

{
	"Title": {
		"_text": "CVE-2019-0192"
	},
	"Notes": {
		"Note": [
			{
				"_text": "In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side."
			},
			{
				"_text": "2019-03-07"
			},
			{
				"_text": "2020-12-09"
			}
		]
	},
	"CVE": {
		"_text": "CVE-2019-0192"
	},
	"References": {
		"Reference": [
			{
				"URL": {
					"_text": "http://www.securityfocus.com/bid/107318"
				},
				"Description": {
					"_text": "BID:107318"
				}
			},
			{
				"URL": {
					"_text": "https://security.netapp.com/advisory/ntap-20190327-0003/"
				},
				"Description": {
					"_text": "CONFIRM:https://security.netapp.com/advisory/ntap-20190327-0003/"
				}
			},
			{
				"URL": {
					"_text": "https://www.oracle.com/security-alerts/cpuoct2020.html"
				},
				"Description": {
					"_text": "MISC:https://www.oracle.com/security-alerts/cpuoct2020.html"
				}
			},
			{
				"URL": {
					"_text": "https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
				},
				"Description": {
					"_text": "MISC:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html"
				}
			},
			{
				"URL": {
					"_text": "https://lists.apache.org/thread.html/b0ace855f569c6b7a0b03ba68566e53b1a1a519abd536bf38978ce4a@%3Cdev.lucene.apache.org%3E"
				},
				"Description": {
					"_text": "MLIST:[lucene-dev] 20190320 [jira] [Commented] (SOLR-13301) [CVE-2019-0192] Deserialization of untrusted data via jmx.serviceUrl"
				}
			},
			{
				"URL": {
					"_text": "https://lists.apache.org/thread.html/42c5682f4acd1d03bd963e4f47ae448d7cff66c16b19142773818892@%3Cdev.lucene.apache.org%3E"
				},
				"Description": {
					"_text": "MLIST:[lucene-dev] 20190320 [jira] [Issue Comment Deleted] (SOLR-13301) [CVE-2019-0192] Deserialization of untrusted data via jmx.serviceUrl"
				}
			},
			{
				"URL": {
					"_text": "https://lists.apache.org/thread.html/ec9c572fb803b26ba0318777977ee6d6a2fb3a2c50d9b4224e541d5d@%3Cdev.lucene.apache.org%3E"
				},
				"Description": {
					"_text": "MLIST:[lucene-dev] 20190326 [jira] [Commented] (SOLR-13301) [CVE-2019-0192] Deserialization of untrusted data via jmx.serviceUrl"
				}
			},
			{
				"URL": {
					"_text": "https://lists.apache.org/thread.html/d0e608c681dfbb16b4da68d99d43fa0ddbd366bb3bcf5bc0d43c56d7@%3Cdev.lucene.apache.org%3E"
				},
				"Description": {
					"_text": "MLIST:[lucene-dev] 20190326 [jira] [Updated] (SOLR-13301) [CVE-2019-0192] Deserialization of untrusted data via jmx.serviceUrl"
				}
			},
			{
				"URL": {
					"_text": "https://lists.apache.org/thread.html/53e4744b14fb7f1810405f8ff5531ab0953a23dd09ce8071ce87e00d@%3Cdev.lucene.apache.org%3E"
				},
				"Description": {
					"_text": "MLIST:[lucene-dev] 20190327 [jira] [Commented] (SOLR-13301) [CVE-2019-0192] Deserialization of untrusted data via jmx.serviceUrl"
				}
			},
			{
				"URL": {
					"_text": "https://lists.apache.org/thread.html/bcce5a9c532b386c68dab2f6b3ce8b0cc9b950ec551766e76391caa3@%3Ccommits.nifi.apache.org%3E"
				},
				"Description": {
					"_text": "MLIST:[nifi-commits] 20191113 svn commit: r1869773 - /nifi/site/trunk/security.html"
				}
			},
			{
				"URL": {
					"_text": "https://lists.apache.org/thread.html/rca37935d661f4689cb4119f1b3b224413b22be161b678e6e6ce0c69b@%3Ccommits.nifi.apache.org%3E"
				},
				"Description": {
					"_text": "MLIST:[nifi-commits] 20200123 svn commit: r1873083 - /nifi/site/trunk/security.html"
				}
			},
			{
				"URL": {
					"_text": "https://lists.apache.org/thread.html/rc400db37710ee79378b6c52de3640493ff538c2beb41cefdbbdf2ab8@%3Ccommits.submarine.apache.org%3E"
				},
				"Description": {
					"_text": "MLIST:[submarine-commits] 20201209 [GitHub] [submarine] QiAnXinCodeSafe opened a new issue #474: There is a vulnerability in Apache Solr 5.5.4,upgrade recommended"
				}
			},
			{
				"URL": {
					"_text": "http://mail-archives.us.apache.org/mod_mbox/www-announce/201903.mbox/%3CCAECwjAV1buZwg%2BMcV9EAQ19MeAWztPVJYD4zGK8kQdADFYij1w%40mail.gmail.com%3E"
				},
				"Description": {
					"_text": "MLIST:[www-announce] 20190307 CVE-2019-0192 Deserialization of untrusted data via jmx.serviceUrl in Apache Solr"
				}
			},
			{
				"URL": {
					"_text": "https://access.redhat.com/errata/RHSA-2019:2413"
				},
				"Description": {
					"_text": "REDHAT:RHSA-2019:2413"
				}
			}
		]
	}
}