CVE-2019-12409

Scores

EPSS

0.828high82.8%
0%20%40%60%80%100%

Percentile: 82.8%

CVSS

9.1critical3.x
0246810

CVSS Score: 9.1/10

All CVSS Scores

CVSS 3.x
9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

CVSS 2.0
7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Description

The 8.1.1 and 8.2.0 releases of Apache Solr contain an insecure setting for the ENABLE_REMOTE_JMX_OPTS configuration option in the default solr.in.sh configuration file shipping with Solr. If you use the default solr.in.sh file from the affected releases, then JMX monitoring will be enabled and exposed on RMI_PORT (default=18983), without any authentication. If this port is opened for inbound traffic in your firewall, then anyone with network access to your Solr nodes will be able to access JMX, which may in turn allow them to upload malicious code for execution on the Solr server.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdubuntu

CWEs

CWE-306CWE-434

Related Vulnerabilities

Exploits

Exploit ID: CVE-2019-12409

Source: github-poc

URL: https://github.com/mbadanoiu/CVE-2019-12409

Vulnerable Software (7)

Type: Configuration

Product: lucene-solr

Operating System: ubuntu bionic 18.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: lucene-solr

Operating System: ubuntu disco 19.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: lucene-solr

Operating System: ubuntu eoan 19.10

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: lucene-solr

Operating System: ubuntu trusty 14.04

Trait:
{  "unfixed": true}

Source: ubuntu

Type: Configuration

Product: lucene-solr

Operating System: ubuntu xenial 16.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: lucene-solr

Operating System: debian

Trait:
{  "unaffected": true}

Source: debian

Type: Configuration

Vendor: *

Product: solr

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:a:apache:solr:8.1.1:*:*:*:*:*:*:*",          "vulnerable": true        },        {          "cpe23uri": "cpe:2...

Source: nvd

End of list