Логотип exploitDog
bind:CVE-2019-12409
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-12409

Количество 6

Количество 6

ubuntu логотип

CVE-2019-12409

почти 6 лет назад

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.

CVSS3: 9.8
EPSS: Высокий
redhat логотип

CVE-2019-12409

почти 6 лет назад

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.

CVSS3: 9.1
EPSS: Высокий
nvd логотип

CVE-2019-12409

почти 6 лет назад

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.

CVSS3: 9.8
EPSS: Высокий
debian логотип

CVE-2019-12409

почти 6 лет назад

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure settin ...

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-2289-pqfq-6wx7

почти 6 лет назад

Unrestricted upload of file with dangerous type in Apache Solr

CVSS3: 9.8
EPSS: Высокий
fstec логотип

BDU:2019-04789

почти 6 лет назад

Уязвимость компонента solr.in.sh поискового сервера Apache Solr, позволяющая нарушителю загружать вредоносные файлы

CVSS3: 9.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2019-12409

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.

CVSS3: 9.8
83%
Высокий
почти 6 лет назад
redhat логотип
CVE-2019-12409

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.

CVSS3: 9.1
83%
Высокий
почти 6 лет назад
nvd логотип
CVE-2019-12409

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.

CVSS3: 9.8
83%
Высокий
почти 6 лет назад
debian логотип
CVE-2019-12409

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure settin ...

CVSS3: 9.8
83%
Высокий
почти 6 лет назад
github логотип
GHSA-2289-pqfq-6wx7

Unrestricted upload of file with dangerous type in Apache Solr

CVSS3: 9.8
83%
Высокий
почти 6 лет назад
fstec логотип
BDU:2019-04789

Уязвимость компонента solr.in.sh поискового сервера Apache Solr, позволяющая нарушителю загружать вредоносные файлы

CVSS3: 9.8
83%
Высокий
почти 6 лет назад

Уязвимостей на страницу