CVE-2019-0193

7.2 HIGH CISA KEV - Actively Exploited
Published: August 01, 2019 Modified: October 27, 2025

Description

In Apache Solr, the DataImportHandler, an optional but popular module to pull in data from databases and other sources, has a feature in which the whole DIH configuration can come from a request's "dataConfig" parameter. The debug mode of the DIH admin screen uses this to allow convenient debugging / development of a DIH config. Since a DIH config can contain scripts, this parameter is a security risk. Starting with version 8.2.0 of Solr, use of this parameter requires setting the Java System property "enable.dih.dataConfigParam" to true.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://issues.apache.org/jira/browse/SOLR-13669
Source: security@apache.org
Mitigation Vendor Advisory
https://lists.debian.org/debian-lts-announce/2019/10/msg00013.html
Source: security@apache.org
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/08/msg00025.html
Source: security@apache.org
Mailing List Third Party Advisory
https://issues.apache.org/jira/browse/SOLR-13669
Source: af854a3a-2127-422b-91ae-364da2661108
Mitigation Vendor Advisory
https://lists.debian.org/debian-lts-announce/2019/10/msg00013.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://lists.debian.org/debian-lts-announce/2020/08/msg00025.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2019-0193
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
US Government Resource

45 reference(s) from NVD

Quick Stats

CVSS v3 Score
7.2 / 10.0
EPSS (Exploit Probability)
93.2%
100th percentile
Exploitation Status
Actively Exploited
Remediation due: 2022-06-10

Weaknesses (CWE)

Affected Vendors

apache debian