Apache Solr < 4.6.0 'SolrResourceLoader' Directory Traversal

medium Nessus Plugin ID 71846
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote web server contains a Java application that is affected by a directory traversal vulnerability.


The version of Apache Solr running on the remote web server is affected by a directory traversal vulnerability because the 'SolrResourceLoader' class fails to restrict access to the loading of specially crafted XLS stylesheets and velocity templates. A remote, unauthenticated attacker can exploit this issue by crafting a URL with directory traversal characters to access resources outside of the instance directory.


Upgrade to Apache Solr version 4.6.0 or later.

See Also




Plugin Details

Severity: Medium

ID: 71846

File Name: solr_4_6_0.nasl

Version: 1.7

Type: remote

Family: CGI abuses

Published: 1/7/2014

Updated: 1/19/2021

Dependencies: solr_detect.nbin

Risk Information

CVSS Score Source: CVE-2013-6397


Risk Factor: Low

Score: 3.6


Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apache:solr

Required KB Items: installed_sw/Apache Solr

Exploit Ease: No exploit is required

Patch Publication Date: 9/21/2013

Vulnerability Publication Date: 5/30/2013

Reference Information

CVE: CVE-2013-6397

BID: 63935