Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
2013-12-07T20:55:02.633
2025-04-11T00:51:21.963
Deferred
CVSSv2: 4.3 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:N/A:N
8.6
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | apache | solr | ≤ 4.5.1 | Yes |
Application | apache | solr | 4.0.0 | Yes |
Application | apache | solr | 4.0.0 | Yes |
Application | apache | solr | 4.0.0 | Yes |
Application | apache | solr | 4.1.0 | Yes |
Application | apache | solr | 4.2.0 | Yes |
Application | apache | solr | 4.2.1 | Yes |
Application | apache | solr | 4.3.0 | Yes |
Application | apache | solr | 4.3.1 | Yes |
Application | apache | solr | 4.4.0 | Yes |
Application | apache | solr | 4.5.0 | Yes |