First published: Sat Dec 07 2013(Updated: )
Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Solr | <=4.5.1 | |
Apache Solr | =4.0.0 | |
Apache Solr | =4.0.0-alpha | |
Apache Solr | =4.0.0-beta | |
Apache Solr | =4.1.0 | |
Apache Solr | =4.2.0 | |
Apache Solr | =4.2.1 | |
Apache Solr | =4.3.0 | |
Apache Solr | =4.3.1 | |
Apache Solr | =4.4.0 | |
Apache Solr | =4.5.0 | |
maven/org.apache.solr:solr-core | <4.6.0 | 4.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.