Vulnerability Description
An issue was discovered in Alfresco Community Edition 5.2 201707. By leveraging multiple components in the Alfresco Software applications, an exploit chain was observed that allows an attacker to achieve remote code execution on the victim machine. The attacker must upload malicious Solr configuration files and then receive a JMX connection from the victim, and serve a Java object that results in deserialization and code execution.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Alfresco | Alfresco | 5.2 |
Related Weaknesses (CWE)
References
- https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-14224-AuthentiExploitThird Party Advisory
- https://github.com/DrunkenShells/Disclosures/tree/master/CVE-2019-14224-AuthentiExploitThird Party Advisory
FAQ
What is CVE-2019-14224?
CVE-2019-14224 is a vulnerability with a CVSS score of 7.2 (HIGH). An issue was discovered in Alfresco Community Edition 5.2 201707. By leveraging multiple components in the Alfresco Software applications, an exploit chain was observed that allows an attacker to achi...
How severe is CVE-2019-14224?
CVE-2019-14224 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-14224?
Check the references section above for vendor advisories and patch information. Affected products include: Alfresco Alfresco.