CVE-2019-0192

CRITICAL EXPLOITED NUCLEI

Apache Solr < 5.5.5 - Insecure Deserialization

Title source: rule

Description

In Apache Solr versions 5.0.0 to 5.5.5 and 6.0.0 to 6.6.5, the Config API allows to configure the JMX server via an HTTP POST request. By pointing it to a malicious RMI server, an attacker could take advantage of Solr's unsafe deserialization to trigger remote code execution on the Solr side.

Exploits (2)

nomisec WORKING POC 210 stars
by mpgn · remote
https://github.com/mpgn/CVE-2019-0192
nomisec WORKING POC 4 stars
by Rapidsafeguard · remote
https://github.com/Rapidsafeguard/Solr-RCE-CVE-2019-0192

Nuclei Templates (1)

Apache Solr - Deserialization of Untrusted Data
CRITICALby hnd3884
Shodan: title:"Solr"
FOFA: title="Solr

References (14)

Scores

CVSS v3 9.8
EPSS 0.9355
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2021-04-12

Classification

CWE
CWE-502
Status published

Affected Products (3)

apache/solr < 5.5.5
netapp/storage_automation_store
org.apache.solr/solr-core < 7.0.0Maven

Timeline

Published Mar 07, 2019
Tracked Since Feb 18, 2026