Directory traversal vulnerability in SolrResourceLoader in Apache Solr prior to 4.6 allows remote malicious users to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
apache solr 4.5.0 |
||
apache solr 4.0.0 |
||
apache solr |
||
apache solr 4.2.1 |
||
apache solr 4.3.0 |
||
apache solr 4.4.0 |
||
apache solr 4.2.0 |
||
apache solr 4.3.1 |
||
apache solr 4.1.0 |