CVE-2013-6397
07.12.2013, 20:55
Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
| Vendor | Product | Version |
|---|---|---|
| apache | solr | 𝑥 ≤ 4.5.1 |
| apache | solr | 4.0.0 |
| apache | solr | 4.0.0:alpha |
| apache | solr | 4.0.0:beta |
| apache | solr | 4.1.0 |
| apache | solr | 4.2.0 |
| apache | solr | 4.2.1 |
| apache | solr | 4.3.0 |
| apache | solr | 4.3.1 |
| apache | solr | 4.4.0 |
| apache | solr | 4.5.0 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
References