Path traversal in Apache Solr - CVE-2017-3163
Published: May 21, 2018
Vulnerability identifier: #VU12899
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-3163
CWE-ID: CWE-22
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Apache Foundation
Affected software:
Apache Solr
Apache Solr
Detailed vulnerability description
The vulnerability allows a remote attacker to obtain potentially sensitive information on the atrget system.
The weakness exists the Index Replication feature due to pulling index files from a master/leader node using an HTTP API which accepts a file name and improper validation of the file name. A remote attacker can submit a specially crafted special request, conduct path traversal attack, leaving any file readable to the Solr server process exposed.
The weakness exists the Index Replication feature due to pulling index files from a master/leader node using an HTTP API which accepts a file name and improper validation of the file name. A remote attacker can submit a specially crafted special request, conduct path traversal attack, leaving any file readable to the Solr server process exposed.
How to mitigate CVE-2017-3163
Update to version 5.5.4 or 6.4.1.