CVE-2017-3163

Priority
Description
When using the Index Replication feature, Apache Solr nodes can pull index
files from a master/leader node using an HTTP API which accepts a file
name. However, Solr before 5.5.4 and 6.x before 6.4.1 did not validate the
file name, hence it was possible to craft a special request involving path
traversal, leaving any file readable to the Solr server process exposed.
Solr servers protected and restricted by firewall rules and/or
authentication would not be at risk since only trusted clients and users
would gain direct HTTP access.
Ubuntu-Description
Hrishikesh Gadre discovered that Apache Solr did not validate the file name,
hence an attacker could possible to craft a special request involving path
traversal that could made it crash and provoke a denial of service.
Notes
Package
Upstream:needs-triage
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE (trusty was needed)
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (3.6.2+dfsg-11)
Ubuntu 20.04 LTS (Focal Fossa):not-affected (3.6.2+dfsg-11)
Ubuntu 20.10 (Groovy Gorilla):not-affected (3.6.2+dfsg-11)
More Information

Updated: 2020-10-24 06:41:23 UTC (commit 69e225d81a6ee3e2e014950178db797c5d4e5009)