• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Apache Solr Exploit Attempt - CVE-2019-0193

Risk Factors

This vulnerability is well known, and public exploit code is available. An unauthenticated attacker can conduct malicious activity such as establishing command-and-control communication, installing malware, or performing reconnaissance through a reverse shell on a compromised device.

Kill Chain

Exploitation

Risk Score

64

Next in Exploitation: Apache Spark Exploit Attempt - CVE-2022-33891

Attack Background

Apache Solr is a Java-based search platform for enterprise software. Solr supports DataImportHandler (DIH), an optional plugin for uploading structured data from databases and other sources. DIH enables administrators to remotely change the entire DIH configuration through an HTTP request with a dataConfig parameter. Because the parameter string can include malicious scripts or code, DIH is vulnerable to remote code execution (RCE). An attacker sends an HTTP request with a malicious dataConfig parameter string in the URI or a payload in the HTTP request body. The malicious code or script runs on the Apache server. For example, an attacker can incorporate shellcode into the parameter string to create a reverse shell and run commands on the victim.

Mitigation Options

Upgrade to Solr 8.2.0 or later

If unable to upgrade, edit solrconfig.xml to include an empty string in the dataConfig parameter "invariants" list section for all DataImportHandler usages

Restrict access to Apache Solr DIH request handler to authorized users only

MITRE ATT&CK ID

What else can RevealX do for you?