Arbitrary Code Injection Affecting lucene-solr package, versions <3.6.2+dfsg-22


Severity

Recommended
low

Based on Debian security rating.

Threat Intelligence

Exploit Maturity
Mature
EPSS
93% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-LUCENESOLR-456703
  • published5 Aug 2019
  • disclosed1 Aug 2019

Introduced: 1 Aug 2019

CVE-2019-0193  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade Debian:unstable lucene-solr to version 3.6.2+dfsg-22 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream lucene-solr package and not the lucene-solr package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.

References

CVSS Scores

version 3.1