RULE(RULE ID:322021)

Rule General Information
Release Date: 2019-06-27
Rule Name: Apache Solr SolrResourceLoader Directory Traversal Vulnerability (CVE-2013-6397)
Severity:
CVE ID:
Rule Protection Details
Description: Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT.NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
Impact: An attacker can abtain sensitive information of the target victim, and do malicious actions to gain profits using the information.
Affected OS: Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others
Reference: SecurityFocusBID:63935
http://lucene.apache.org/solr/4_6_0/changes/Changes.html
http://rhn.redhat.com/errata/RHSA-2013-1844.html
http://rhn.redhat.com/errata/RHSA-2014-0029.html
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://issues.apache.org/jira/browse/SOLR-4882