Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.solr/solr-core
  4. ›
  5. CVE-2013-6397

CVE-2013-6397: Directory traversal when loading XSL stylesheets and Velocity templates

December 7, 2013 (updated October 23, 2015)

Directory traversal vulnerability in SolrResourceLoader in this package allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.

References

  • bugzilla.redhat.com/CVE-2013-6397

Code Behaviors & Features

Detect and mitigate CVE-2013-6397 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions up to 4.5.1

Fixed versions

  • 4.6.0
  • 5.0.0

Solution

Upgrade to versions 4.6.0, 5.0.0 or above.

Impact 4.3 MEDIUM

AV:N/AC:M/Au:N/C:P/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

maven/org.apache.solr/solr-core/CVE-2013-6397.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:34 +0000.