Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-0192

Опубликовано: 07 мар. 2019
Источник: debian
EPSS Критический

Описание

In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
lucene-solrnot-affectedpackage

Примечания

  • https://issues.apache.org/jira/browse/SOLR-13301

EPSS

Процентиль: 100%
0.93674
Критический

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 7 лет назад

In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.

CVSS3: 9.8
redhat
почти 7 лет назад

In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.

CVSS3: 9.8
nvd
почти 7 лет назад

In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.

CVSS3: 9.8
github
почти 7 лет назад

Critical severity vulnerability that affects org.apache.solr:solr-core

CVSS3: 9.8
fstec
почти 7 лет назад

Уязвимость программного интерфейса Config поискового сервера Apache Solr, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.93674
Критический