Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
{
"binaries": [
{
"binary_name": "liblucene3-contrib-java",
"binary_version": "3.6.2+dfsg-2"
},
{
"binary_name": "liblucene3-java",
"binary_version": "3.6.2+dfsg-2"
},
{
"binary_name": "liblucene3-java-doc",
"binary_version": "3.6.2+dfsg-2"
},
{
"binary_name": "libsolr-java",
"binary_version": "3.6.2+dfsg-2"
},
{
"binary_name": "solr-common",
"binary_version": "3.6.2+dfsg-2"
},
{
"binary_name": "solr-jetty",
"binary_version": "3.6.2+dfsg-2"
},
{
"binary_name": "solr-tomcat",
"binary_version": "3.6.2+dfsg-2"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_name": "liblucene3-contrib-java",
"binary_version": "3.6.2+dfsg-8"
},
{
"binary_name": "liblucene3-java",
"binary_version": "3.6.2+dfsg-8"
},
{
"binary_name": "liblucene3-java-doc",
"binary_version": "3.6.2+dfsg-8"
},
{
"binary_name": "libsolr-java",
"binary_version": "3.6.2+dfsg-8"
},
{
"binary_name": "solr-common",
"binary_version": "3.6.2+dfsg-8"
},
{
"binary_name": "solr-jetty",
"binary_version": "3.6.2+dfsg-8"
},
{
"binary_name": "solr-tomcat",
"binary_version": "3.6.2+dfsg-8"
}
],
"availability": "No subscription required"
}