Remote Code Execution Vulnerability in Default Configuration of Apache Solr (CVE-2019-12409)


Latest Update 12/28/19

Please note that this update contains additional information that was not available during the time of writing.

FortiGuard Labs has developed an IPS signature for the proof of concepts mentioned in this Threat Signal as:


which has been officially released in IPS definitions version 15.735.

Also, after further analysis, FortiGuard Labs has confirmed that the following existing signature addresses CVE-2019-12409:


We will continue to monitor this event for any further developments and will update this Threat Signal if relevant.

The FortiGuard SE team is aware of recent events affecting Apache Solr (CVE-2019-12409). Apache Solr is a scalable search platform that incorporates the Java framework to provided distributed indexing, replication and load balanced queries. Back in July, multiple researchers disclosed to the Apache Software Foundation that a new vulnerability exists in Solr, which allows access to the monitoring of data over JMX, which later turned out to be more serious than first thought. Later, it was discovered that remote code execution (RCE) was possible in Apache Solr, due to a bad default configuration. During the initial assessment, the initial severity was not regarded as high due to the fact that RCE was unknown at the time. Because of the possibility of RCE, the team upgraded the severity and obtained a CVE number.

Analysis by FortiGuard Labs is currently ongoing, specifically the vulnerability along with the published proof of concept code for coverage, and we will update this document once we have relevant information to share.

What is the vulnerability specifically?

Apache Solr 8.11 and 8.20 is affected by an insecure setting within the "ENABLE_REMOTE_JMX_OPTS" configuration option, which is located within the default configuration file. The default file in affected versions has JMX monitoring enabled and exposed on RMI_PORT (18983) which does not require authentication. If the port is open for inbound traffic within a firewall of the host, anyone with network access to Solr nodes can access JMX, which will then allow for the upload of malicious code for execution on the Solr server.

Two proof of concepts were published in October to GitHub and these highlight the usage of the known exploit to access port 8983, to enable support of Apache Velocity templates on the Solr server, which can then be used for remote code execution.

It appears that Solr 8.3.0 was released in November, does this address the vulnerability completely?

No, there is no patch released at this time. According to Apache, there is no need to update or upgrade code. Please refer to the mitigation steps below for further details. According to Apache, Solr 8.3.0, released in November, mitigates this vulnerability. However, there has been some rebukes to this claim from Tenable, please see below for further details.

Although Apache Solr states in its release notes that this vulnerability has been addressed with version 8.3.0, security researchers at Tenable state otherwise. We have not validated or substantiated these claims at this time.

Are there any mitigations available?

According to the advisory, Apache recommends the following:

Make sure your effective file has ENABLE_REMOTE_JMX_OPTS set to 'false' on every Solr node and then restart Solr. Note that the effective file may reside in /etc/defaults/ or another location depending on the install. You can then validate that the '*' family of properties are not listed in the "Java Properties" section of the Solr Admin UI, or configured in a secure way.

Also, the FortiGuard SE team recommends that system administrators perform an audit of their network to ensure that machines running Apache Solr and any other services that were not meant to be exposed externally, be firewalled as soon as time permits and that authentication be enabled to ensure additional mitigation from external access.

What platforms are affected?

Linux machines running Apache Solr are affected. Windows operating systems are unaffected by this advisory.

Are there any known proof of concepts?

Yes, there are two known proof of concepts published on October 29 and 30. Please refer to the appendix for further details.

Has there been any observed in the wild attacks?

We have not seen any in the wild attacks at this time. Due to the update of this latest disclosure and the proof of concepts already written there is a reasonable expectation that in the wild attacks may be forthcoming within a short amount of time.

What is the status of AV and IPS coverage?

IPS coverage is currently under investigation. Once a signature is deemed feasible for release, this document will be updated with relevant coverage information.

AV coverage is not feasible for this event.


Exploitation for Client Execution

ID: T1203

Tactic: Execution

Platform: Linux, Windows, macOS

System Requirements: Remote exploitation for execution requires a remotely accessible service reachable over the network or other vector of access such as spearphishing or drive-by compromise.

Data Sources: Anti-virus, System calls, Process monitoring

Supports Remote: Yes

Version: 1.0