Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2963-1 | lucene-solr security update |
Github GHSA |
GHSA-j8qw-mwmv-28cg | Improper Limitation of a Pathname to a Restricted Directory in Apache Solr |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T17:39:01.267Z
Reserved: 2013-11-04T00:00:00
Link: CVE-2013-6397
No data.
Status : Deferred
Published: 2013-12-07T20:55:02.633
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-6397
OpenCVE Enrichment
No data.
Debian DSA
Github GHSA