RULE(RULE ID:323457)

Rule General Information
Release Date: 2019-10-09
Rule Name: Apache Solr DataImportHandler Remote Code Execution Vulnerability -3 (CVE-2019-0193)
Severity:
CVE ID:
Rule Protection Details
Description: In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.
Impact: An attacker can execute arbitrary code via a successful exploit in the context of the vulnerable software.
Affected OS: Windows, Others
Reference: https://issues.apache.org/jira/browse/SOLR-13669
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://issues.apache.org/jira/browse/SOLR-13669