First published: Sat Dec 07 2013(Updated: )
Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Solr | <=4.5.1 | |
Apache Solr | =4.0.0 | |
Apache Solr | =4.0.0-alpha | |
Apache Solr | =4.0.0-beta | |
Apache Solr | =4.1.0 | |
Apache Solr | =4.2.0 | |
Apache Solr | =4.2.1 | |
Apache Solr | =4.3.0 | |
Apache Solr | =4.3.1 | |
Apache Solr | =4.4.0 | |
Apache Solr | =4.5.0 | |
maven/org.apache.solr:solr-core | <4.6.0 | 4.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6397 is classified with a moderate severity rating, allowing unauthorized access to files.
To fix CVE-2013-6397, upgrade Apache Solr to version 4.6.0 or later.
CVE-2013-6397 affects Apache Solr versions 4.0.0 through 4.5.1.
CVE-2013-6397 allows remote attackers to exploit directory traversal to read arbitrary files on the server.
The CVE-2013-6397 vulnerability involves the tr parameter in the URL and the wt parameter set to XSLT.