First published: Sat Dec 07 2013(Updated: )
The UpdateRequestHandler for XML in Apache Solr before 4.1 allows remote attackers to have an unspecified impact via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.solr:solr-core | <4.1.0 | 4.1.0 |
Apache Solr | <=4.0.0 | |
Apache Solr | =3.6.0 | |
Apache Solr | =3.6.1 | |
Apache Solr | =3.6.2 | |
Apache Solr | =4.0.0-alpha | |
Apache Solr | =4.0.0-beta |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6407 has not been assigned a CVSS score, but it is classified as a significant vulnerability due to its potential for enabling XML External Entity attacks.
To fix CVE-2013-6407, upgrade to Apache Solr version 4.1.0 or later.
The risks associated with CVE-2013-6407 include potential remote code execution and data exposure through XML External Entity injection.
Apache Solr versions prior to 4.1.0, including 3.6.0, 3.6.1, 3.6.2, and 4.0.0-alpha/beta, are affected by CVE-2013-6407.
Yes, CVE-2013-6407 is specifically an XML External Entity (XXE) issue that arises from improper handling of XML data.