Description
Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
Published: 2013-12-07
Score: 4.3 Medium
EPSS: 92.2% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2963-1 lucene-solr security update
Github GHSA Github GHSA GHSA-j8qw-mwmv-28cg Improper Limitation of a Pathname to a Restricted Directory in Apache Solr
History

No history.

Subscriptions

Apache Solr
Redhat Jboss Data Grid Jboss Enterprise Web Framework
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T17:39:01.267Z

Reserved: 2013-11-04T00:00:00.000Z

Link: CVE-2013-6397

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2013-12-07T20:55:02.633

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-6397

cve-icon Redhat

Severity : Important

Publid Date: 2013-11-26T00:00:00Z

Links: CVE-2013-6397 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses