Deserialization of Untrusted Data Affecting org.apache.solr:solr-core package, versions [5.0.0,7.0.0)
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHESOLR-173756
- published 7 Mar 2019
- disclosed 7 Mar 2019
- credit Michael Stepankin
Introduced: 7 Mar 2019
CVE-2019-0192 Open this link in a new tabHow to fix?
Upgrade org.apache.solr:solr-core
to version 7.0.0 or higher.
Overview
org.apache.solr:solr-core is an open source enterprise search platform built on Apache Lucene
Affected versions of this package are vulnerable to Deserialization of Untrusted Data.
ConfigAPI allows to set a jmx.serviceUrl
that will create a new JMXConnectorServerFactory
and trigger a call with 'bind' operation to a target RMI/LDAP server. A malicious RMI server could respond with arbitrary object that will be deserialized on the Solr side using java's ObjectInputStream
, which is considered unsafe. This type of vulnerabilities can be exploited with ysoserial tool. Depending on the target classpath
, an attacker can use one of known "gadget chains" to trigger Remote Code Execution on the Solr side.