Lucene search

K
githubGitHub Advisory DatabaseGHSA-J8QW-MWMV-28CG
HistoryMay 17, 2022 - 4:04 a.m.

Improper Limitation of a Pathname to a Restricted Directory in Apache Solr

2022-05-1704:04:29
CWE-22
GitHub Advisory Database
github.com
14

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.528 Medium

EPSS

Percentile

97.6%

Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a … (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.

Affected configurations

Vulners
Node
org.apache.solr\solrMatchcore
CPENameOperatorVersion
org.apache.solr:solr-corelt4.6.0

4.3 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:N/A:N

0.528 Medium

EPSS

Percentile

97.6%