In Solr the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of unsafe deserialization in Solr to trigger remote code execution on the Solr side.
CVEID: CVE-2019-0192
DESCRIPTION: Apache Solr could allow a remote attacker to execute arbitrary code on the system, caused by a deserialization of untrusted data flaw in jmx.serviceUrl. By sending a specially-crafted request, an attacker could exploit this vulnerability to execute arbitrary code on the system.
CVSS Base Score: 9.8
CVSS Temporal Score: See <https://exchange.xforce.ibmcloud.com/vulnerabilities/157932> for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
IBM Operations Analytics - Log Analysis version 1.3.1, 1.3.2, 1.3.3, 1.3.4 and 1.3.5
Principal Product and Version(s) | Fix Details |
---|---|
IBM Operations Analytics - Log Analysis version 1.3.1, 1.3.2, 1.3.3, 1.3.4 and 1.3.5 |
1. Goto IBM [Fix Central](<https://www-945.ibm.com/support/fixcentral/swg/selectFixes?parent=IBM Operations Analytics&product=ibm/Tivoli/IBM+SmartCloud+Analytics±+Log+Analysis&release=1.3.5&platform=All&function=all>)
2. Download 1.3.5 Fix Pack 3 ( x86_64, s390x or ppc64le )