Published: 07/12/2013 Updated: 17/07/2014
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:P

Vulnerability Summary

The UpdateRequestHandler for XML in Apache Solr prior to 4.1 allows remote malicious users to have an unspecified impact via XML data containing an external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache solr 3.6.0

apache solr 3.6.1

apache solr 3.6.2

apache solr

apache solr 4.0.0

Vendor Advisories

Debian Bug report logs - #731113 lucene-solr: CVE-2013-6397 CVE-2013-6407 CVE-2013-6408 Package: lucene-solr; Maintainer for lucene-solr is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Mon, 2 Dec 2013 09:06:02 UTC Severity: grave Tags: ...
Multiple vulnerabilities were found in Solr, an open source enterprise search server based on Lucene, resulting in information disclosure or code execution For the stable distribution (wheezy), these problems have been fixed in version 360+dfsg-1+deb7u1 For the testing distribution (jessie), these problems have been fixed in version 362+dfsg- ...

Github Repositories

Apache Solr Injection Research

Apache Solr Injection Research Table of Contents Introduction Solr API quick overview Apache Solr Injection Solr Parameters Injection (HTTP smuggling) Exploitation examples Solr Local Parameters Injection Ways to RCE [CVE-2017-12629] Remote Code Execution via RunExecutableListener [CVE-2019-0192] Deserialization of untrusted data via jmxserviceUrl Attack via deseriali