CVE-2013-6397

Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:solr:4.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:solr:4.0.0:alpha:*:*:*:*:*:*
cpe:2.3:a:apache:solr:4.0.0:beta:*:*:*:*:*:*
cpe:2.3:a:apache:solr:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:solr:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:solr:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:solr:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:solr:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:solr:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:solr:4.5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:59

Type Values Removed Values Added
References () http://lucene.apache.org/solr/4_6_0/changes/Changes.html - () http://lucene.apache.org/solr/4_6_0/changes/Changes.html -
References () http://rhn.redhat.com/errata/RHSA-2013-1844.html - () http://rhn.redhat.com/errata/RHSA-2013-1844.html -
References () http://rhn.redhat.com/errata/RHSA-2014-0029.html - () http://rhn.redhat.com/errata/RHSA-2014-0029.html -
References () http://secunia.com/advisories/55730 - Vendor Advisory () http://secunia.com/advisories/55730 - Vendor Advisory
References () http://secunia.com/advisories/59372 - () http://secunia.com/advisories/59372 -
References () http://www.agarri.fr/kom/archives/2013/11/27/compromising_an_unreachable_solr_server_with_cve-2013-6397/index.html - Exploit () http://www.agarri.fr/kom/archives/2013/11/27/compromising_an_unreachable_solr_server_with_cve-2013-6397/index.html - Exploit
References () http://www.openwall.com/lists/oss-security/2013/11/27/1 - () http://www.openwall.com/lists/oss-security/2013/11/27/1 -
References () http://www.securityfocus.com/bid/63935 - () http://www.securityfocus.com/bid/63935 -
References () https://issues.apache.org/jira/browse/SOLR-4882 - Patch () https://issues.apache.org/jira/browse/SOLR-4882 - Patch

07 Nov 2023, 02:17

Type Values Removed Values Added
Summary Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries. Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.

Information

Published : 2013-12-07 20:55

Updated : 2024-11-21 01:59


NVD link : CVE-2013-6397

Mitre link : CVE-2013-6397

CVE.ORG link : CVE-2013-6397


JSON object : View

Products Affected

apache

  • solr
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')