APAR status
Closed as program error.
Error description
Apache Solr cloud allows a remote attacker to execute arbitrary code on the system, caused by a deserialization of untrusted data flaw in jmx.serviceUrl.
Local fix
To avoid this vulnerability the config API can be disabled. This can be done by adding the system property "disable.configEdit=true". This can be achieved by adding "-Ddisable.configEdit=true" to the sart-solr.sh or start-solr.bat startup scripts. Solr then needs to be stopped and restarted.
Problem summary
Apache Solr cloud allow a remote attacker to execute arbitrary code on the system.
Problem conclusion
Avoid vulnerability by set the config api to read only mode.
Temporary fix
Comments
APAR Information
APAR number
JR60869
Reported component name
INFO SRVR PLATF
Reported component ID
5724Q3612
Reported release
B50
Status
CLOSED PER
PE
NoPE
HIPER
NoHIPER
Special Attention
NoSpecatt / Xsystem
Submitted date
2019-04-02
Closed date
2019-04-08
Last modified date
2019-04-08
APAR is sysrouted FROM one or more of the following:
APAR is sysrouted TO one or more of the following:
Fix information
Fixed component name
INFO SRVR PLATF
Fixed component ID
5724Q3612
Applicable component levels
[{"Business Unit":{"code":"BU059","label":"IBM Software w\/o TPS"},"Product":{"code":"SSZJPZ","label":"IBM InfoSphere Information Server"},"Component":"","ARM Category":[],"Platform":[{"code":"PF025","label":"Platform Independent"}],"Version":"11.5","Edition":"","Line of Business":{"code":"LOB10","label":"Data and AI"}}]
Document Information
Modified date:
08 April 2019