Description
Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2963-1 | lucene-solr security update |
Github GHSA |
GHSA-j8qw-mwmv-28cg | Improper Limitation of a Pathname to a Restricted Directory in Apache Solr |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T17:39:01.267Z
Reserved: 2013-11-04T00:00:00.000Z
Link: CVE-2013-6397
No data.
Status : Deferred
Published: 2013-12-07T20:55:02.633
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-6397
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Github GHSA