CVE-2019-0193

NameCVE-2019-0193
DescriptionIn Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1954-1
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lucene-solr (PTS)jessie3.6.2+dfsg-5+deb8u2vulnerable
jessie (security)3.6.2+dfsg-5+deb8u3fixed
stretch (security), stretch3.6.2+dfsg-10+deb9u2vulnerable
buster3.6.2+dfsg-20vulnerable
bullseye3.6.2+dfsg-21vulnerable
sid3.6.2+dfsg-22fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lucene-solrsource(unstable)3.6.2+dfsg-22low
lucene-solrsourcejessie3.6.2+dfsg-5+deb8u3highDLA-1954-1

Notes

https://issues.apache.org/jira/browse/SOLR-13669
upstream recommends everybody upgrade or rework their configuration
consider backporting enable.dih.dataConfigParam instead:
https://github.com/apache/lucene-solr/commit/325824cd391c8e71f36f17d687f52344e50e9715

Search for package or bug name: Reporting problems