|
|||
Rule General Information |
---|
Release Date: | 2019-06-27 | |
Rule Name: | Apache Solr SolrResourceLoader Directory Traversal Vulnerability (CVE-2013-6397) | |
Severity: | ||
CVE ID: | ||
Rule Protection Details |
---|
Description: | Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT.NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries. | |
Impact: | An attacker can abtain sensitive information of the target victim, and do malicious actions to gain profits using the information. | |
Affected OS: | Windows, Linux, FreeBSD, Solaris, Other Unix, Network Device, Mac OS, iOS, Android, Others | |
Reference: | SecurityFocusBID:63935 http://lucene.apache.org/solr/4_6_0/changes/Changes.html http://rhn.redhat.com/errata/RHSA-2013-1844.html http://rhn.redhat.com/errata/RHSA-2014-0029.html |
|
Solutions |
---|
The vendors have released upgrade patches to fix vulnerabilities, please visit: https://issues.apache.org/jira/browse/SOLR-4882 |