Published on: 26 November 2019
The Apache Software Foundation has released a security advisory to address an insecure setting issue in Apache Solr 8.1.1 and 8.2.0 for Linux. A remote unauthenticated attacker could leverage the vulnerability to upload and run malicious code on vulnerable systems
The proof-of-concept exploit code targeting the remote code execution vulnerability (CVE-2019-12409) has been publicly available. Attacks against any of the vulnerable systems are highly likely from now on. Users are advised to take immediate action to fix the affected systems to mitigate the elevated risk of cyber attacks.
Successful exploitation of the vulnerability could result in arbitrary code execution on affected systems.
System administrators should take the following actions as advised by the Apache Software Foundation to address the issue:
System administrations should also restrict only trusted services/users to access the Apache Solr nodes and never expose the Apache Solr nodes directly to the Internet.
https://lucene.apache.org/solr/news.html#18-november-2019-cve-2019-12409-apache-solr-rce-vulnerability-due-to-bad-config-default
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12409