Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-3163

Опубликовано: 30 авг. 2017
Источник: nvd
CVSS3: 7.5
CVSS2: 5
EPSS Средний

Описание

When using the Index Replication feature, Apache Solr nodes can pull index files from a master/leader node using an HTTP API which accepts a file name. However, Solr before 5.5.4 and 6.x before 6.4.1 did not validate the file name, hence it was possible to craft a special request involving path traversal, leaving any file readable to the Solr server process exposed. Solr servers protected and restricted by firewall rules and/or authentication would not be at risk since only trusted clients and users would gain direct HTTP access.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:apache:solr:*:*:*:*:*:*:*:*
Версия до 5.5.3 (включая)
cpe:2.3:a:apache:solr:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:solr:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:solr:6.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:solr:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:solr:6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:solr:6.3.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:solr:6.4.0:*:*:*:*:*:*:*

EPSS

Процентиль: 95%
0.16448
Средний

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

When using the Index Replication feature, Apache Solr nodes can pull index files from a master/leader node using an HTTP API which accepts a file name. However, Solr before 5.5.4 and 6.x before 6.4.1 did not validate the file name, hence it was possible to craft a special request involving path traversal, leaving any file readable to the Solr server process exposed. Solr servers protected and restricted by firewall rules and/or authentication would not be at risk since only trusted clients and users would gain direct HTTP access.

CVSS3: 5.9
redhat
почти 9 лет назад

When using the Index Replication feature, Apache Solr nodes can pull index files from a master/leader node using an HTTP API which accepts a file name. However, Solr before 5.5.4 and 6.x before 6.4.1 did not validate the file name, hence it was possible to craft a special request involving path traversal, leaving any file readable to the Solr server process exposed. Solr servers protected and restricted by firewall rules and/or authentication would not be at risk since only trusted clients and users would gain direct HTTP access.

CVSS3: 7.5
debian
больше 8 лет назад

When using the Index Replication feature, Apache Solr nodes can pull i ...

CVSS3: 7.5
github
больше 7 лет назад

Improper Limitation of a Pathname ('Path Traversal') in org.apache.solr:solr-core

EPSS

Процентиль: 95%
0.16448
Средний

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-22