First published: Sat Dec 07 2013(Updated: )
The (1) UpdateRequestHandler for XSLT or (2) XPathEntityProcessor in Apache Solr before 4.1 allows remote attackers to have an unspecified impact via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue, different vectors than CVE-2013-6407.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Solr | <=4.0.0 | |
Apache Solr | =4.0.0-alpha | |
Apache Solr | =4.0.0-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6612 is considered a critical vulnerability due to its potential to lead to XML External Entity (XXE) attacks.
To fix CVE-2012-6612, update Apache Solr to version 4.1 or later, as these versions contain patches that address the vulnerability.
CVE-2012-6612 allows remote attackers to exploit vulnerabilities via crafted XML data, potentially leading to data disclosure or denial of service.
CVE-2012-6612 affects Apache Solr versions prior to 4.1, including 4.0.0 and its alpha and beta releases.
Yes, CVE-2012-6612 is categorized as an XML External Entity (XXE) vulnerability that allows for unauthorized data access.