7.5
CVSSv2

CVE-2019-12409

Published: 18/11/2019 Updated: 07/11/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache solr 8.1.1

apache solr 8.2.0

Github Repositories

Apache Solr RCE (ENABLE_REMOTE_JMX_OPTS="true")

CVE-2019-12409 Apache Solr RCE ENABLE_REMOTE_JMX_OPTS="true" root@kali:/opt/solr-811/bin# c

Helps you find sensitive open ports, which usually leads to an easy RCE.

Easy RCE Scanner Script for the automation of your Pentest or Bug Bounty recon It will help you find sensitive open ports, which usually leads to an easy RCE Sensible Ports IBM WebSphere : 8880 Apache Hadoop : 8088 Apache Spark : 6066 Apache Solr : 8983 Redis : 6379 Docker : 2375, 2376 Zoho Manageengine Desktop : 8383 Atlassian Crowd : 4990 Portainer : 9000 Hashicorp Consul