Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
{ "binaries": [ { "binary_name": "liblucene3-contrib-java", "binary_version": "3.6.2+dfsg-2" }, { "binary_name": "liblucene3-java", "binary_version": "3.6.2+dfsg-2" }, { "binary_name": "liblucene3-java-doc", "binary_version": "3.6.2+dfsg-2" }, { "binary_name": "libsolr-java", "binary_version": "3.6.2+dfsg-2" }, { "binary_name": "solr-common", "binary_version": "3.6.2+dfsg-2" }, { "binary_name": "solr-jetty", "binary_version": "3.6.2+dfsg-2" }, { "binary_name": "solr-tomcat", "binary_version": "3.6.2+dfsg-2" } ], "availability": "No subscription required", "ubuntu_priority": "medium" }
{ "binaries": [ { "binary_name": "liblucene3-contrib-java", "binary_version": "3.6.2+dfsg-8" }, { "binary_name": "liblucene3-java", "binary_version": "3.6.2+dfsg-8" }, { "binary_name": "liblucene3-java-doc", "binary_version": "3.6.2+dfsg-8" }, { "binary_name": "libsolr-java", "binary_version": "3.6.2+dfsg-8" }, { "binary_name": "solr-common", "binary_version": "3.6.2+dfsg-8" }, { "binary_name": "solr-jetty", "binary_version": "3.6.2+dfsg-8" }, { "binary_name": "solr-tomcat", "binary_version": "3.6.2+dfsg-8" } ], "availability": "No subscription required", "ubuntu_priority": "medium" }