Improper Limitation of a Pathname to a Restricted Directory in Apache Solr
Moderate severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Mar 5, 2024
Description
Published by the National Vulnerability Database
Dec 7, 2013
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Jul 7, 2022
Last updated
Mar 5, 2024
Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
References