CVE-2013-6397

Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT.  NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
4.3 UNKNOWN
NETWORK
MEDIUM
AV:N/AC:M/Au:N/C:P/I:N/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 99%
VendorProductVersion
apachesolr
𝑥
≤ 4.5.1
apachesolr
4.0.0
apachesolr
4.0.0:alpha
apachesolr
4.0.0:beta
apachesolr
4.1.0
apachesolr
4.2.0
apachesolr
4.2.1
apachesolr
4.3.0
apachesolr
4.3.1
apachesolr
4.4.0
apachesolr
4.5.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
lucene-solr
bullseye
3.6.2+dfsg-24
fixed
sid
3.6.2+dfsg-26
fixed
trixie
3.6.2+dfsg-26
fixed
bookworm
3.6.2+dfsg-26
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
lucene-solr
yakkety
not-affected
xenial
not-affected
wily
ignored
vivid
ignored
utopic
ignored
trusty
not-affected
saucy
ignored
raring
ignored
quantal
ignored
precise
dne
lucid
dne