{"id":9691,"date":"2019-12-03T01:16:58","date_gmt":"2019-12-03T01:16:58","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=9691"},"modified":"2026-04-17T18:07:51","modified_gmt":"2026-04-17T18:07:51","slug":"apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/","title":{"rendered":"Apache Solr Remote Code Execution Vulnerability (CVE-2019-12409) Threat Alert"},"content":{"rendered":"<p><!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\"><br \/>\n<html><body><\/p>\n<h2><strong>Vulnerability Description<\/strong><\/h2>\n<p>On November 18, local time, Apache Software Foundation (ASF) released an official security bulletin to reveal a remote code execution vulnerability (CVE-2019-12409) in Apache Solr. This vulnerability exists and can bring security risks because the configuration item ENABLE_REMOTE_JMX_OPTS in the configuration file <strong>solr.in.sh<\/strong> is enabled by default.<\/p>\n<p>If you use the default configuration file <strong>solr.in.sh<\/strong> from the affected Solr release, JMX monitoring will be enabled and exposed on the RMI port (default is 18983), without any authentication. If this port is opened for inbound traffic in your firewall, anyone with access to your Solr nodes will be able to access JMX and can upload malicious code to execute on the Solr server. Please check and fix the vulnerability.<\/p>\n<p>References:<\/p>\n<p>https:\/\/lucene.apache.org\/solr\/news.html<\/p>\n<p>https:\/\/issues.apache.org\/jira\/browse\/SOLR-13647<\/p>\n<h2><strong>Scope of Impact<\/strong><\/h2>\n<p><strong>Affected Versions<\/strong><\/p>\n<p>Apache Solr 8.1.1<\/p>\n<p>Apache Solr 8.2.0<\/p>\n<p>Note: Only Solr on Linux systems is vulnerable, but not affected on Windows systems.<\/p>\n<h2><strong>Vulnerability Detection<\/strong><\/h2>\n<h3><strong>Manual Detection<\/strong><\/h3>\n<p>On the dashboard of the Solr background, you can view the current Solr version information. If the Solr version is vulnerable, there may be security risks.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-full wp-image-9692\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-1.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"567\" height=\"252\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-1.jpg 567w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-1-300x133.jpg 300w\" sizes=\"(max-width: 567px) 100vw, 567px\" \/><\/a><\/p>\n<p>If the configuration item ENABLE_REMOTE_JMX_OPTS in <strong>solr.in.sh<\/strong> is <strong>true<\/strong>, Solr may be vulnerable.<\/p>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-2.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9693\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-2.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"567\" height=\"300\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-2.jpg 567w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-2-300x159.jpg 300w\" sizes=\"(max-width: 567px) 100vw, 567px\" \/><\/a><\/p>\n<h2><strong>Vulnerability Protection<\/strong><\/h2>\n<p>At present, ASF has not released a new version to fix the vulnerability. Affected users are advised to visit the following website to obtain the latest updates immediately after they are available:<\/p>\n<p>https:\/\/lucene.apache.org\/solr\/<\/p>\n<h3><strong>Temporary Mitigation Measures<\/strong><\/h3>\n<p>ASF officially provides the following mitigation measures:<\/p>\n<ul>\n<li>Change the configuration item &#8220;ENABLE_REMOTE_JMX_OPTS&#8221;=&#8221;true&#8221; in the configuration file <strong>solr.in.sh<\/strong> in the \/bin folder in theSolr installation directory to &#8220;false&#8221;, and then restart Solr.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-3.jpg\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9694\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-3.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"567\" height=\"309\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-3.jpg 567w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-3-300x163.jpg 300w\" sizes=\"(max-width: 567px) 100vw, 567px\" \/><\/a><\/p>\n<ul>\n<li>You should verify that the related property information of &#8220;com.sun.management.jmxremote*&#8221; is not included in the &#8220;Java Properties&#8221; option in the administrator interface of Solr.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-4.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-9695\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-4.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" width=\"483\" height=\"367\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-4.jpg 483w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1203-4-300x228.jpg 300w\" sizes=\"(max-width: 483px) 100vw, 483px\" \/><\/a><\/p>\n<ul>\n<li>Restrict public network access to Solr by allowing only trusted traffic to establish communication with Solr.<\/li>\n<\/ul>\n<h2><strong>Statement<\/strong><\/h2>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<h2><strong>About NSFOCUS<\/strong><\/h2>\n<p>NSFOCUS, Inc., a global network and cyber security leader, protects enterprises and carriers from advanced cyber attacks. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide multi-layered, unified and dynamic protection against advanced cyber attacks.<\/p>\n<p>NSFOCUS works with Fortune Global 500 companies, including four of the world&#8217;s five largest financial institutions, organizations in insurance, retail, healthcare, critical infrastructure industries as well as government agencies. NSFOCUS has technology and channel partners in more than 60 countries, is a member of both the Microsoft Active Protections Program (MAPP), and the Cloud Security Alliance (CSA).<\/p>\n<p>A wholly owned subsidiary of NSFOCUS Information Technology Co. Ltd., the company has operations in the Americas, Europe, the Middle East and Asia Pacific.<\/body><\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Description On November 18, local time, Apache Software Foundation (ASF) released an official security bulletin to reveal a remote code execution vulnerability (CVE-2019-12409) in Apache Solr. This vulnerability exists and can bring security risks because the configuration item ENABLE_REMOTE_JMX_OPTS in the configuration file solr.in.sh is enabled by default. If you use the default configuration [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":9573,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[81],"class_list":["post-9691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-apache-solr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Apache Solr Remote Code Execution Vulnerability (CVE-2019-12409) Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Apache Solr Remote Code Execution Vulnerability (CVE-2019-12409) Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Description On November 18, local time, Apache Software Foundation (ASF) released an official security bulletin to reveal a remote code\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2019-12-03T01:16:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1112-8.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Apache Solr Remote Code Execution Vulnerability (CVE-2019-12409) Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Vulnerability Description On November 18, local time, Apache Software Foundation (ASF) released an official security bulletin to reveal a remote code\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1112-8.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"Apache Solr Remote Code Execution Vulnerability (CVE-2019-12409) Threat Alert\",\"datePublished\":\"2019-12-03T01:16:58+00:00\",\"dateModified\":\"2026-04-17T18:07:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\\\/\"},\"wordCount\":570,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/1112-8.jpg\",\"keywords\":[\"Apache Solr\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\\\/\",\"name\":\"Apache Solr Remote Code Execution Vulnerability (CVE-2019-12409) Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/1112-8.jpg\",\"datePublished\":\"2019-12-03T01:16:58+00:00\",\"dateModified\":\"2026-04-17T18:07:51+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/1112-8.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2019\\\/11\\\/1112-8.jpg\",\"width\":430,\"height\":212,\"caption\":\"Apache Solr logo with red sunburst design.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Apache Solr Remote Code Execution Vulnerability (CVE-2019-12409) Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Apache Solr Remote Code Execution Vulnerability (CVE-2019-12409) Threat Alert - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/","og_locale":"pt_BR","og_type":"article","og_title":"Apache Solr Remote Code Execution Vulnerability (CVE-2019-12409) Threat Alert - NSFOCUS","og_description":"Vulnerability Description On November 18, local time, Apache Software Foundation (ASF) released an official security bulletin to reveal a remote code","og_url":"https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2019-12-03T01:16:58+00:00","article_modified_time":"2026-04-17T18:07:51+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1112-8.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"Apache Solr Remote Code Execution Vulnerability (CVE-2019-12409) Threat Alert - NSFOCUS","twitter_description":"Vulnerability Description On November 18, local time, Apache Software Foundation (ASF) released an official security bulletin to reveal a remote code","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1112-8.jpg","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"Apache Solr Remote Code Execution Vulnerability (CVE-2019-12409) Threat Alert","datePublished":"2019-12-03T01:16:58+00:00","dateModified":"2026-04-17T18:07:51+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/"},"wordCount":570,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1112-8.jpg","keywords":["Apache Solr"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/","name":"Apache Solr Remote Code Execution Vulnerability (CVE-2019-12409) Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1112-8.jpg","datePublished":"2019-12-03T01:16:58+00:00","dateModified":"2026-04-17T18:07:51+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1112-8.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2019\/11\/1112-8.jpg","width":430,"height":212,"caption":"Apache Solr logo with red sunburst design."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/apache-solr-remote-code-execution-vulnerability-cve-2019-12409-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Apache Solr Remote Code Execution Vulnerability (CVE-2019-12409) Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9691","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=9691"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/9691\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/9573"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=9691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=9691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=9691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}