ExtraHop named a Leader in the 2025 Forrester Wave™: Network Analysis And Visibility Solutions

Search
  • Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Apache Solr Exploit Attempt - CVE-2019-0193

Risk Factors

This vulnerability is well known, and public exploit code is available. An unauthenticated attacker can conduct malicious activity such as establishing command-and-control communication, installing malware, or performing reconnaissance through a reverse shell on a compromised device.

Category

Exploitation
Next in Exploitation: Apache Spark Exploit Attempt - CVE-2022-33891

Attack Background

Apache Solr is a Java-based search platform for enterprise software. Solr supports DataImportHandler (DIH), an optional plugin for uploading structured data from databases and other sources. DIH enables administrators to remotely change the entire DIH configuration through an HTTP request with a dataConfig parameter. Because the parameter string can include malicious scripts or code, DIH is vulnerable to remote code execution (RCE). An attacker sends an HTTP request with a malicious dataConfig parameter string in the URI or a payload in the HTTP request body. The malicious code or script runs on the Apache server. For example, an attacker can incorporate shellcode into the parameter string to create a reverse shell and run commands on the victim.

Mitigation Options

Upgrade to Solr 8.2.0 or later

If unable to upgrade, edit solrconfig.xml to include an empty string in the dataConfig parameter "invariants" list section for all DataImportHandler usages

Restrict access to Apache Solr DIH request handler to authorized users only

MITRE ATT&CK ID

Associated content

Announcing The Forrester Wave™: Network Analysis And Visibility Solutions, Q4 2025

Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.

Report

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response — ExtraHop

ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response

News

Detections

Visit this resource for more information.

Docs

The 2025 ExtraHop Global Threat Landscape Report: The Alarming Reality of Threat Actor Dwell Time and Deeper Network Access — ExtraHop

This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.

Blog

ExtraHop RevealX MITRE ATT&CK Coverage 2024 — ExtraHop

Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.

Blog

MITRE ATT&CK - Network Detection & Response with RevealX — ExtraHop

Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.

External
Periodic Table of Use Cases

What else can RevealX do for you?