Bug 1692345 (CVE-2019-0192)
Summary: | CVE-2019-0192 solr: remote code execution due to unsafe deserialization | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Dhananjay Arunesh <darunesh> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | aileenc, bmaxwell, cdewolf, chazlett, csutherl, darran.lofthouse, dimitris, dosoudil, fgavrilo, gvarsami, jawilson, jcoleman, jondruse, kconner, ldimaggi, lgao, myarboro, nwallace, pgier, ppalaga, psakar, pslavice, puntogil, rnetuka, rstancel, rsvoboda, rwagner, tcunning, tkirby, twalsh, vtunka |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in the Apache Solr's Config API, where it would permit the configuration of the JMX server via an HTTP POST request. An attacker could use this flaw to direct traffic to a malicious RMI server, and then trigger remote code execution or conduct further attacks.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2019-08-08 13:18:37 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1692346 | ||
Bug Blocks: | 1692348 |
Description
Dhananjay Arunesh
2019-03-25 12:25:06 UTC
Created solr3 tracking bugs for this issue: Affects: fedora-all [bug 1692346] Mitigation: * Upgrade to 6.6.6 or later * Disable the ConifgAPI if not in use (`disable.configEdit=true`) * Use other external means to ensure only trusted traffic is allowed (block POST requests to the config API from external sources) This issue has been addressed in the following products: Red Hat Fuse 7.4.0 Via RHSA-2019:2413 https://access.redhat.com/errata/RHSA-2019:2413 This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2019-0192 |