Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2013-6397


Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.


Published

2013-12-07T20:55:02.633

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 4.3 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:N/A:N

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: NONE
Exploitability Score

8.6

Impact Score

2.9

Weaknesses
  • Type: Primary
    CWE-22

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application apache solr ≤ 4.5.1 Yes
Application apache solr 4.0.0 Yes
Application apache solr 4.0.0 Yes
Application apache solr 4.0.0 Yes
Application apache solr 4.1.0 Yes
Application apache solr 4.2.0 Yes
Application apache solr 4.2.1 Yes
Application apache solr 4.3.0 Yes
Application apache solr 4.3.1 Yes
Application apache solr 4.4.0 Yes
Application apache solr 4.5.0 Yes

References