Skip to content

Improper Limitation of a Pathname to a Restricted Directory in Apache Solr

Moderate severity GitHub Reviewed Published May 17, 2022 to the GitHub Advisory Database • Updated Mar 5, 2024

Package

maven org.apache.solr:solr-core (Maven)

Affected versions

< 4.6.0

Patched versions

4.6.0

Description

Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.

References

Published by the National Vulnerability Database Dec 7, 2013
Published to the GitHub Advisory Database May 17, 2022
Reviewed Jul 7, 2022
Last updated Mar 5, 2024

Severity

Moderate

EPSS score

52.819%
(98th percentile)

Weaknesses

CVE ID

CVE-2013-6397

GHSA ID

GHSA-j8qw-mwmv-28cg

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.