CVE-2013-6397
Solr: directory traversal when loading XSL stylesheets and Velocity templates
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
Vulnerabilidad de salto de directorio en SolrResourceLoader en Apache Solr anteriores a 4.6 permite a atacantes remotos leer ficheros arbitrarios a través de un .. (punto puno) o nombre de directorio completo en el parámetro tr de solr/select/, cuando el escritor de respuesta (parámetro wt) se establece a XLST. NOTA: esto puede ser aprovechado utilizando una vulnerabilidad XXE (XML eXternal Entity) diferente para permitir acceso a ficheros a través de límites de red restringidos.
Red Hat JBoss Web Framework Kit combines popular open source web frameworks into a single solution for Java applications. The Apache Solr component is an open-source search server based on the Lucene Java search library. It was found that the SolrResourceLoader class in Apache Solr allowed loading of resources via absolute paths, or relative paths which were not sanitized for directory traversal. Some Solr components expose REST interfaces which load resources via SolrResourceLoader, using paths identified by REST parameters. A remote attacker could use this flaw to load arbitrary local files on the server via SolrResourceLoader, potentially resulting in information disclosure or remote code execution.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2013-11-04 CVE Reserved
- 2013-12-07 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://lucene.apache.org/solr/4_6_0/changes/Changes.html | X_refsource_confirm | |
http://secunia.com/advisories/59372 | Third Party Advisory | |
http://www.openwall.com/lists/oss-security/2013/11/27/1 | Mailing List |
|
http://www.securityfocus.com/bid/63935 | Vdb Entry |
URL | Date | SRC |
---|---|---|
http://www.agarri.fr/kom/archives/2013/11/27/compromising_an_unreachable_solr_server_with_cve-2013-6397/index.html | 2024-08-06 |
URL | Date | SRC |
---|---|---|
https://issues.apache.org/jira/browse/SOLR-4882 | 2023-11-07 |
URL | Date | SRC |
---|---|---|
http://rhn.redhat.com/errata/RHSA-2013-1844.html | 2023-11-07 | |
http://rhn.redhat.com/errata/RHSA-2014-0029.html | 2023-11-07 | |
http://secunia.com/advisories/55730 | 2023-11-07 | |
https://access.redhat.com/security/cve/CVE-2013-6397 | 2014-01-15 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1035062 | 2014-01-15 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Apache Search vendor "Apache" | Solr Search vendor "Apache" for product "Solr" | <= 4.5.1 Search vendor "Apache" for product "Solr" and version " <= 4.5.1" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Solr Search vendor "Apache" for product "Solr" | 4.0.0 Search vendor "Apache" for product "Solr" and version "4.0.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Solr Search vendor "Apache" for product "Solr" | 4.0.0 Search vendor "Apache" for product "Solr" and version "4.0.0" | alpha |
Affected
| ||||||
Apache Search vendor "Apache" | Solr Search vendor "Apache" for product "Solr" | 4.0.0 Search vendor "Apache" for product "Solr" and version "4.0.0" | beta |
Affected
| ||||||
Apache Search vendor "Apache" | Solr Search vendor "Apache" for product "Solr" | 4.1.0 Search vendor "Apache" for product "Solr" and version "4.1.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Solr Search vendor "Apache" for product "Solr" | 4.2.0 Search vendor "Apache" for product "Solr" and version "4.2.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Solr Search vendor "Apache" for product "Solr" | 4.2.1 Search vendor "Apache" for product "Solr" and version "4.2.1" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Solr Search vendor "Apache" for product "Solr" | 4.3.0 Search vendor "Apache" for product "Solr" and version "4.3.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Solr Search vendor "Apache" for product "Solr" | 4.3.1 Search vendor "Apache" for product "Solr" and version "4.3.1" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Solr Search vendor "Apache" for product "Solr" | 4.4.0 Search vendor "Apache" for product "Solr" and version "4.4.0" | - |
Affected
| ||||||
Apache Search vendor "Apache" | Solr Search vendor "Apache" for product "Solr" | 4.5.0 Search vendor "Apache" for product "Solr" and version "4.5.0" | - |
Affected
|