![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.903509 |
Categoría: | Web application abuses |
Título: | Apache Solr XML External Entity (XXE) Vulnerability (SOLR-3895, SOLR-5520) - Linux |
Resumen: | Apache Solr is prone to an XML external entity (XXE) vulnerability. |
Descripción: | Summary: Apache Solr is prone to an XML external entity (XXE) vulnerability. Vulnerability Insight: The flaw is due to error in 'UpdateRequestHandler' and 'XPathEntityProcessor' when parsing XML entities. Vulnerability Impact: Successful exploitation will allow remote attackers to gain potentially sensitive information, cause denial of service and potentially perform other more advanced XXE attacks. Affected Software/OS: Apache Solr versions before 3.6.3 and 4.x before version 4.1.0. Solution: Update to version 3.6.3, 4.1.0 or later. CVSS Score: 7.5 CVSS Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-6407 55542 http://secunia.com/advisories/55542 59372 http://secunia.com/advisories/59372 RHSA-2013:1844 http://rhn.redhat.com/errata/RHSA-2013-1844.html RHSA-2014:0029 http://rhn.redhat.com/errata/RHSA-2014-0029.html [oss-security] 20131128 Re: CVE Request: Apache Solr XXE http://www.openwall.com/lists/oss-security/2013/11/29/2 http://svn.apache.org/viewvc/lucene/dev/branches/branch_4x/solr/CHANGES.txt?view=markup https://issues.apache.org/jira/browse/SOLR-3895 Common Vulnerability Exposure (CVE) ID: CVE-2012-6612 RedHat Security Advisories: RHSA-2013:1844 RedHat Security Advisories: RHSA-2014:0029 |
Copyright | Copyright (C) 2014 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |