CVE-2019-0193

Published Aug 1, 2019

Last updated 4 months ago

Overview

Description
In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.
Source
security@apache.org
NVD status
Analyzed

Risk scores

CVSS 3.1

Type
Primary
Base score
7.2
Impact score
5.9
Exploitability score
1.2
Vector string
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Severity
HIGH

CVSS 2.0

Type
Primary
Base score
9
Impact score
10
Exploitability score
8
Vector string
AV:N/AC:L/Au:S/C:C/I:C/A:C

Known exploits

Data from CISA

Vulnerability name
Apache Solr DataImportHandler Code Injection Vulnerability
Exploit added on
Dec 10, 2021
Exploit action due
Jun 10, 2022
Required action
Apply updates per vendor instructions.

Weaknesses

nvd@nist.gov
CWE-94

Social media

Hype score
Not currently trending

Configurations

References