9
CVSSv2

CVE-2019-0193

Published: 01/08/2019 Updated: 08/08/2019
CVSS v2 Base Score: 9 | Impact Score: 10 | Exploitability Score: 8
CVSS v3 Base Score: 7.2 | Impact Score: 5.9 | Exploitability Score: 1.2
VMScore: 801
Vector: AV:N/AC:L/Au:S/C:C/I:C/A:C

Vulnerability Summary

A vulnerability in Apache Solr could allow an authenticated, remote malicious user to execute arbitrary code on a targeted system. The vulnerability exists in the DataImportHandler module and is due to insufficient security restrictions imposed by the affected software. An attacker could exploit this vulnerability by submitting a malicious request to the affected system. A successful exploit could allow the malicious user to execute arbitrary code on the targeted system. Apache has confirmed this vulnerability and released software updates.

Vulnerability Trend

Affected Products

Vendor Product Versions
ApacheSolr1.1.0, 1.2, 1.3.0, 1.4.0, 3.1, 3.2, 3.3, 3.4.0, 3.5.0, 3.6.0, 3.6.1, 3.6.2, 4.0.0, 4.1.0, 4.2.0, 4.2.1, 4.3.0, 4.3.1, 4.4.0, 4.5.0, 4.5.1, 4.6.0, 4.6.1, 4.7.0, 4.7.1, 4.7.2, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.10.0, 4.10.1, 4.10.2, 4.10.3, 4.10.4, 5.0, 5.1, 5.1.0, 5.2.0, 5.2.1, 5.3, 5.3.0, 5.3.1, 5.3.2, 5.4.0, 5.4.1, 5.5.0, 5.5.1, 5.5.2, 5.5.3, 5.5.4, 5.5.5, 6.0.0, 6.0.1, 6.1.0, 6.2.0, 6.2.1, 6.3.0, 6.4.0, 6.4.1, 6.4.2, 6.5.0, 6.5.1, 6.6.0, 6.6.1, 6.6.2, 6.6.3, 6.6.4, 6.6.5, 7.0.0, 7.0.1, 7.1.0, 7.2.0, 7.2.1, 7.3.0, 7.3.1, 7.4.0, 7.5.0, 7.6.0, 7.7.0, 7.7.1, 7.7.2, 8.0.0, 8.1.0, 8.1.1

Vendor Advisories

Impact: Important Public Date: 2019-07-31 CWE: CWE-20 Bugzilla: 1736774: CVE-2019-0193 solr: Remote Cod ...

Github Repositories

solr_exploit Apache Solr远程代码执行漏洞(CVE-2019-0193) Exploit

CVE-2019-0193 Apache Solr DataImportHandler RCE 1首先判读是否solr不需认证直接可访问后台(大多数均可访问) 2判断是否存在collections 3判断collections是否可以使用dataimport功能 4debug模式修改configuration 原: <dataConfig> <dataSource type="JdbcDataSource" driver="commicros

CVE-2019-0193 Solr DataImport Handler RCE

CVE-2019-0193 Remote Code Execution

公开笔记 SDL - 安全开发生命周期 实践与意义 SDL - API设计规范 CheckList NTA - 网络流量分析 基础 抓包实践(wireshark/Tshark) NTA - 网络流量分析 IDS/IPS 原理 引擎 规则(suricata) sec - Elasticsearch及Elastic Stack web - vul - SQLi 原理 利用方式 修复方案 web - vul - SSRF 原理 利用方式 修复方案 web - vul - XSS 原理

Apache Solr Injection Research Table of Contents Introduction Solr API quick overview Apache Solr Injection Solr Parameters Injection (HTTP smuggling) Exploitation examples Solr Local Parameters Injection Ways to RCE [CVE-2017-12629] Remote Code Execution via RunExecutableListener [CVE-2019-0192] Deserialization of untrusted data via jmxserviceUrl Attack via deseriali