Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-3163

Опубликовано: 15 фев. 2017
Источник: redhat
CVSS3: 5.9
EPSS Средний

Описание

When using the Index Replication feature, Apache Solr nodes can pull index files from a master/leader node using an HTTP API which accepts a file name. However, Solr before 5.5.4 and 6.x before 6.4.1 did not validate the file name, hence it was possible to craft a special request involving path traversal, leaving any file readable to the Solr server process exposed. Solr servers protected and restricted by firewall rules and/or authentication would not be at risk since only trusted clients and users would gain direct HTTP access.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Data Grid 6solr-coreOut of support scope
Red Hat JBoss Data Virtualization 6solr-coreNot affected
Red Hat JBoss Fuse 6camelNot affected
Red Hat JBoss Fuse Service Works 6solr-coreWill not fix
Red Hat JBoss Portal 6solr-coreUnder investigation
Red Hat JBoss Enterprise Application Platform 6.4solr-coreFixedRHSA-2018:144714.05.2018
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5codehaus-jacksonFixedRHSA-2018:145014.05.2018
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5hornetqFixedRHSA-2018:145014.05.2018
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5jboss-as-appclientFixedRHSA-2018:145014.05.2018
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5jbossas-appclientFixedRHSA-2018:145014.05.2018

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1454783solr: Directory traversal via Index Replication HTTP API

EPSS

Процентиль: 95%
0.16448
Средний

5.9 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

When using the Index Replication feature, Apache Solr nodes can pull index files from a master/leader node using an HTTP API which accepts a file name. However, Solr before 5.5.4 and 6.x before 6.4.1 did not validate the file name, hence it was possible to craft a special request involving path traversal, leaving any file readable to the Solr server process exposed. Solr servers protected and restricted by firewall rules and/or authentication would not be at risk since only trusted clients and users would gain direct HTTP access.

CVSS3: 7.5
nvd
больше 8 лет назад

When using the Index Replication feature, Apache Solr nodes can pull index files from a master/leader node using an HTTP API which accepts a file name. However, Solr before 5.5.4 and 6.x before 6.4.1 did not validate the file name, hence it was possible to craft a special request involving path traversal, leaving any file readable to the Solr server process exposed. Solr servers protected and restricted by firewall rules and/or authentication would not be at risk since only trusted clients and users would gain direct HTTP access.

CVSS3: 7.5
debian
больше 8 лет назад

When using the Index Replication feature, Apache Solr nodes can pull i ...

CVSS3: 7.5
github
больше 7 лет назад

Improper Limitation of a Pathname ('Path Traversal') in org.apache.solr:solr-core

EPSS

Процентиль: 95%
0.16448
Средний

5.9 Medium

CVSS3