Loading
Directory traversal vulnerability in SolrResourceLoader in Apache Solr before 4.6 allows remote attackers to read arbitrary files via a .. (dot dot) or full pathname in the tr parameter to solr/select/, when the response writer (wt parameter) is set to XSLT. NOTE: this can be leveraged using a separate XXE (XML eXternal Entity) vulnerability to allow access to files across restricted network boundaries.
Use CWE-22, Apache vendor hub and Solr product page to widen CVE-2013-6397 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2023-44487, CVE-2024-45216 and CVE-2023-50386 for nearby disclosures in the same product family.