CVE-2013-6397
07.12.2013, 20:55
Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
Vendor | Product | Version |
---|---|---|
apache | solr | 𝑥 ≤ 4.5.1 |
apache | solr | 4.0.0 |
apache | solr | 4.0.0:alpha |
apache | solr | 4.0.0:beta |
apache | solr | 4.1.0 |
apache | solr | 4.2.0 |
apache | solr | 4.2.1 |
apache | solr | 4.3.0 |
apache | solr | 4.3.1 |
apache | solr | 4.4.0 |
apache | solr | 4.5.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
References