Логотип exploitDog
bind:CVE-2019-12409
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-12409

Количество 6

Количество 6

ubuntu логотип

CVE-2019-12409

больше 5 лет назад

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.

CVSS3: 9.8
EPSS: Высокий
redhat логотип

CVE-2019-12409

больше 5 лет назад

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.

CVSS3: 9.1
EPSS: Высокий
nvd логотип

CVE-2019-12409

больше 5 лет назад

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.

CVSS3: 9.8
EPSS: Высокий
debian логотип

CVE-2019-12409

больше 5 лет назад

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure settin ...

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-2289-pqfq-6wx7

больше 5 лет назад

Unrestricted upload of file with dangerous type in Apache Solr

CVSS3: 9.8
EPSS: Высокий
fstec логотип

BDU:2019-04789

больше 5 лет назад

Уязвимость компонента solr.in.sh поискового сервера Apache Solr, позволяющая нарушителю загружать вредоносные файлы

CVSS3: 9.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-12409

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.

CVSS3: 9.8
83%
Высокий
больше 5 лет назад
redhat логотип
CVE-2019-12409

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.

CVSS3: 9.1
83%
Высокий
больше 5 лет назад
nvd логотип
CVE-2019-12409

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.

CVSS3: 9.8
83%
Высокий
больше 5 лет назад
debian логотип
CVE-2019-12409

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure settin ...

CVSS3: 9.8
83%
Высокий
больше 5 лет назад
github логотип
GHSA-2289-pqfq-6wx7

Unrestricted upload of file with dangerous type in Apache Solr

CVSS3: 9.8
83%
Высокий
больше 5 лет назад
fstec логотип
BDU:2019-04789

Уязвимость компонента solr.in.sh поискового сервера Apache Solr, позволяющая нарушителю загружать вредоносные файлы

CVSS3: 9.8
83%
Высокий
больше 5 лет назад

Уязвимостей на страницу