First published: Sat Dec 07 2013(Updated: )
The DocumentAnalysisRequestHandler in Apache Solr before 4.3.1 does not properly use the EmptyEntityResolver, which allows remote attackers to have an unspecified impact via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-6407.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Solr | <=4.3.0 | |
Apache Solr | =3.6.0 | |
Apache Solr | =3.6.1 | |
Apache Solr | =3.6.2 | |
Apache Solr | =4.0.0 | |
Apache Solr | =4.0.0-alpha | |
Apache Solr | =4.0.0-beta | |
Apache Solr | =4.1.0 | |
Apache Solr | =4.2.0 | |
Apache Solr | =4.2.1 | |
maven/org.apache.solr:solr-core | <4.3.1 | 4.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6408 is classified as a critical vulnerability due to its potential for remote exploitation.
To fix CVE-2013-6408, upgrade Apache Solr to version 4.3.1 or later.
CVE-2013-6408 affects Apache Solr versions 3.6.0 to 4.3.0 inclusive.
The impact of CVE-2013-6408 allows attackers to exploit XML data with external entity declarations, potentially leading to data exposure.
Yes, CVE-2013-6408 has been publicly disclosed and is recognized in cybersecurity databases.