CVE-2019-0193

NameCVE-2019-0193
DescriptionIn Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1954-1, DLA-2327-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
lucene-solr (PTS)jessie, jessie (lts)3.6.2+dfsg-5+deb8u3fixed
stretch (security), stretch (lts), stretch3.6.2+dfsg-10+deb9u3fixed
buster3.6.2+dfsg-20+deb10u2fixed
bullseye3.6.2+dfsg-24fixed
sid, trixie, bookworm3.6.2+dfsg-26fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
lucene-solrsourcejessie3.6.2+dfsg-5+deb8u3DLA-1954-1
lucene-solrsourcestretch3.6.2+dfsg-10+deb9u3DLA-2327-1
lucene-solrsourcebuster3.6.2+dfsg-20+deb10u2
lucene-solrsource(unstable)3.6.2+dfsg-22low

Notes

https://issues.apache.org/jira/browse/SOLR-13669
upstream recommends everybody upgrade or rework their configuration
consider backporting enable.dih.dataConfigParam instead:
https://github.com/apache/lucene-solr/commit/325824cd391c8e71f36f17d687f52344e50e9715

Search for package or bug name: Reporting problems