In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solrs unsafe deserialization to trigger remote code execution on the Solr side.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Solr | Apache | 5.0.0 (including) | 5.5.5 (including) |
Solr | Apache | 6.0.0 (including) | 6.6.5 (including) |
Red Hat Fuse 7.4.0 | RedHat | camel-solr | * |
Lucene-solr | Ubuntu | bionic | * |
Lucene-solr | Ubuntu | cosmic | * |
Lucene-solr | Ubuntu | disco | * |
Lucene-solr | Ubuntu | eoan | * |
Lucene-solr | Ubuntu | focal | * |
Lucene-solr | Ubuntu | groovy | * |
Lucene-solr | Ubuntu | hirsute | * |
Lucene-solr | Ubuntu | impish | * |
Lucene-solr | Ubuntu | kinetic | * |
Lucene-solr | Ubuntu | lunar | * |
Lucene-solr | Ubuntu | mantic | * |
Lucene-solr | Ubuntu | oracular | * |
Lucene-solr | Ubuntu | trusty | * |
Lucene-solr | Ubuntu | trusty/esm | * |
Lucene-solr | Ubuntu | xenial | * |