4.3
CVSSv2

CVE-2013-6397

Published: 07/12/2013 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in SolrResourceLoader in Apache Solr prior to 4.6 allows remote malicious users to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache solr 4.5.0

apache solr 4.0.0

apache solr

apache solr 4.2.1

apache solr 4.3.0

apache solr 4.4.0

apache solr 4.2.0

apache solr 4.3.1

apache solr 4.1.0

Vendor Advisories

Debian Bug report logs - #731113 lucene-solr: CVE-2013-6397 CVE-2013-6407 CVE-2013-6408 Package: lucene-solr; Maintainer for lucene-solr is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Mon, 2 Dec 2013 09:06:02 UTC Severity: grave Tags: ...
Multiple vulnerabilities were found in Solr, an open source enterprise search server based on Lucene, resulting in information disclosure or code execution For the stable distribution (wheezy), these problems have been fixed in version 360+dfsg-1+deb7u1 For the testing distribution (jessie), these problems have been fixed in version 362+dfsg- ...
Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 46 allows remote attackers to read arbitrary files via a (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to al ...

Github Repositories

A collection of attempted exploit requests, explained

Inspecting Malicious Requests I recently stood up a crude web application and my logs were capturing various requests my public IP was attracting I had seen some such requests before but finally decided it warranted a blog post, and you can read more there Otherwise, I'm posting this in a repository as a point of collaboration if any of my readers want to correct, infor