Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
| Version | Base score | Base severity | Vector |
|---|
| Hyperlink | Resource Type |
|---|
Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
| Type | CWE ID | Description |
|---|---|---|
| text | N/A | n/a |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.securityfocus.com/bid/63935 | vdb-entry x_refsource_BID |
| http://rhn.redhat.com/errata/RHSA-2014-0029.html | vendor-advisory x_refsource_REDHAT |
| https://issues.apache.org/jira/browse/SOLR-4882 | x_refsource_CONFIRM |
| http://www.openwall.com/lists/oss-security/2013/11/27/1 | mailing-list x_refsource_MLIST |
| http://secunia.com/advisories/55730 | third-party-advisory x_refsource_SECUNIA |
| http://rhn.redhat.com/errata/RHSA-2013-1844.html | vendor-advisory x_refsource_REDHAT |
| http://lucene.apache.org/solr/4_6_0/changes/Changes.html | x_refsource_CONFIRM |
| http://secunia.com/advisories/59372 | third-party-advisory x_refsource_SECUNIA |
| http://www.agarri.fr/kom/archives/2013/11/27/compromising_an_unreachable_solr_server_with_cve-2013-6397/index.html | x_refsource_MISC |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|---|
| http://www.securityfocus.com/bid/63935 | vdb-entry x_refsource_BID x_transferred |
| http://rhn.redhat.com/errata/RHSA-2014-0029.html | vendor-advisory x_refsource_REDHAT x_transferred |
| https://issues.apache.org/jira/browse/SOLR-4882 | x_refsource_CONFIRM x_transferred |
| http://www.openwall.com/lists/oss-security/2013/11/27/1 | mailing-list x_refsource_MLIST x_transferred |
| http://secunia.com/advisories/55730 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://rhn.redhat.com/errata/RHSA-2013-1844.html | vendor-advisory x_refsource_REDHAT x_transferred |
| http://lucene.apache.org/solr/4_6_0/changes/Changes.html | x_refsource_CONFIRM x_transferred |
| http://secunia.com/advisories/59372 | third-party-advisory x_refsource_SECUNIA x_transferred |
| http://www.agarri.fr/kom/archives/2013/11/27/compromising_an_unreachable_solr_server_with_cve-2013-6397/index.html | x_refsource_MISC x_transferred |
Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
| Date Added | Due Date | Vulnerability Name | Required Action |
|---|---|---|---|
| N/A |
| Type | Version | Base score | Base severity | Vector |
|---|---|---|---|---|
| Primary | 2.0 | 4.3 | MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |